UnixGuy wrote: » Which one would you pick? Pros and Cons of each? Is it possible or even recommended to be an SME in both policy matters and technical matters? What's your experience like working with either? Let's discuss!
philz1982 wrote: » I'm gonna hijack the thread and add some other options: Integration Security SME (someone who is focused on making sure when multiple systems are brought together that the sum of these systems are still secure) Software security champion (someone who isn't a coder but works with coders to introduce security into the SDLC) Pre-sales security (an SME, who works to design system plans and evaluates security and recommends products/solutions and speaks at industry events.
philz1982 wrote: » I would just challenge everyone here to think outside the box. I know first hand that with hard work you can completly bypass traditional "paths". Look, I I didn't know what a sub-net was before 2012 and now I am running the EA practice for a Fortune 100 (building some of the most complex Layer 1 to 7 designs out there) and building integrations using C#, .net, and various other languages, add to the top of this that I am conducting the IT audits and RA's for our partners software. I do not say this to brag but rather to challenge. You don't have to do the ops path, it makes me cringe thinking of folks sitting in a SOC, or doing analyst work because they think they have to do that in order to get into infosec. All you need is the persistence to stay up until midnight each night reading, studying, going to school, volunteering to do testing for non-profits, ect. Hardwork will beat talent and experience almost every time. Look, in 2007 I was replacing air filters and programming air conditioning units and now here I am. You can do it as well, you do not need to take the traditional path! Look, get the certs, get the education, volunteer to build your skills. You will pass up the others who don't work as hard as you! Now let me say if you like working in a SOC or analyst more power to you, there is NOTHING wrong with that, but I want folks to know you don't have to follow the NOC->SOC-> Ect path...
philz1982 wrote: » I like money but I also really do want to improve the security of my sector. I think draft up an email and shoot it over to a few of these places. -Phil
renacido wrote: » I fundamentally agree with you on how people often get a false sense of security by relying on the tools or compliance with some regulations (not just in the SOC by the way, CISOs and auditors can be the worst offenders). You have me intrigued. My company doesn't have much exposure via publicly-facing systems of any kind (remote network access notwithstanding) but now I'm going to give it a closer look to be sure. We keep the attack surface very small but a deeper dive won't hurt. Thanks.
philz1982 wrote: » No worries, What I often see is it's not even the fault of the IT group. Facilities will go and setup a system and will sneak it in some how, sometimes dual homing the system through the public WiFi. I've literally seen client's bypass IT by building their own Zigbee networks in the 2.4 15/20 channel gap.
UnixGuy wrote: » Excellent input guys! Just so we can make it practical for me and everyone else who might read this thread, what practical steps should I take? Get another degree? But we know that academia can be detached from reality. Stay in SOC? Move away from SOC? Cert up? What certs? More policy oriented certs (CISM/CISA/CISSP) or More technical ones (OSCP, GPEN,..) ? Or Both? Get experience in which area? Or just get experience with whatever you can? Work for vendors? financial institution? Government? 3-letter govt organizations? Best places to get the right experience? Contracting and job hopping every few months? I know this is hard to summarise, but I think we can come up with something here. A concrete action plan.
UnixGuy wrote: » To rephrase, doing more policy work vs doing more technical work, which one leads to better career prospects, leadership, freedom (time management). And If working on the technical side or the policy or both, best to approach that? I know it's general but I think it'll benefit a lot of people reading this