Since I’ll be preoccupied with travel this Security Conference week 😬 , this post will be just a message about the Cybersecurity Interview Guide.
I previously put this out for the community as it is an area that can stump anyone (interviews).
This is something I’ve worked on after having collected several interview notes throughout the years. It’s a culmination of years of experiences and talking to others in the field.
I’ve helped a lot of people navigate their journey in the field and wanted to make this to reach more people than I can reach individually.
Essentially excerpts from many interviews that I’ve faced over time, redacted of course.
For more detail on this effort, see my initial post behind the inception of this.
TLDR
For the TLDR, here’s a brief summary.
Cybersecurity Interview Guide
We all know the interview process can be daunting and at times overkill, and we could use resources to help us along the way.
As I mentioned previously, I’ve been working on an Interview Guide, for Cybersecurity professionals by Cybersecurity professionals.
To navigate the uphill battle that is interviews.
The goal of this collection of interviews is to guide you through the process and to understand the concepts behind the questions.
This is geared towards Blue Team roles, but I believe anyone in Security can benefit from its contents.
Learn how to navigate interviews with this collection of questions, scenarios, and technical exercises.
Get yours here
What I Read This Week
Florida draft law mandating encryption backdoors for social media accounts
A subpoena would = backdoor into Social Media accounts
A bill looking out for minors, or for end-to-end decryption?
‘Elusive Comet' Attackers Use Zoom to Swindle Victims
Starts as an ‘invite’ to the Aureon Press or The OnChain Podcast, then infects the victim device through infostealer and RAT
Measuring the Hunt When You Find “Nothing”
I’ve wrote about this in the past, just because a breach isn’t discovered doesn’t mean there isn’t value derived from your threat hunting
Bonus: the death of expertise
I talked about this in last week’s post. The fluid times we are living in has made it where you don’t have to be an “expert” to make it.
Wrapping Up
In closing this one out, for just what a few cups of coffee ☕ would be, the Cybersecurity Interview Guide is yours.
As subscribers, you also can use the code INTERVIEW for a discount of 50%!
It’s already priced below value since the purpose behind creating this is to help as many people as possible.
I hope it helps and I would like to hear your thoughts on it.
See you in the next one.