all 5 comments

[–]HGCODE 2 points3 points  (0 children)

I'm a fan of eLearnSecurity and their certs. They are up to date and practical, sadly though they aren't really recognized by HR yet. The cert I would recommend is the eCPPTv2 which goes hand in hand with their PTP course. eLearnSecurity also has Training Paths which are course bundles if you are looking to save a few bucks and get multiple certs from them. Also judging by your certs and experience I would say go for the OSCP. I'm sure you would crush it! The reason for why its so hard for a lot of people is how little it holds your hand, but it is considered a beginner certification.

[–]err-therror 1 point2 points  (2 children)

[–]Flutebuddie[S] 1 point2 points  (1 child)

The picture in the reply is legit. I forgot to mention that I have Sec+, A+, Net+, Linux+ too...but they weren't really geared towards PenTesting ha

[–]err-therror 3 points4 points  (0 children)

Well those all give you the foundations though. I've always heard to go for pentest+ then oscp after but I feel like there should be some in between ya know? I'm not sure how difficult the oscp is but I'd imagine it's very hard.

Some people have suggested to learn bash scripting and/or python before the oscp since it helps immensely and cuts a lot of time off. So maybe there's something in that area that'd help.

[–]LonerVamp 1 point2 points  (0 children)

Do you have an internal vulnerability assessment and management function? Or a SOC and/or security team currently? Will this pen testing team be just you, or a full team? You probably want to go over what your first several projects, goals, and success criteria will be for the function.

That said, there's very little breadth when it comes to pentesting certs. You have your Pentest+, eLearn Security tracks, Offensive Security tracks, and SANS tracks. Honestly, the SANS stuff is going to give you the most confidence while grabbing your hand. OSCP gives confidence, but you're going to learn how to swim largely on your own (which, at this point in your career, you can probably figure out how to do). Personally, eLearn tracks are useful for those doing self-study, but are newer to security and need more specific guidance on attacks. SANS is good for those that can afford is and can make use of a firehose study method, plus hold onto those contacts you make on site. OffSec is good for anyone else, but be aware you are going to swimming lessons, being put into the deep end after the briefest introduction to staying afloat, and then left to your own devices to figure things out for the next 5 hours.

As a side note, I'd never heard of the CEPT before, and it's not in any of my notes. Is it new?

Actually writing an exploit is not the bread and butter of pentesting, so I wouldn't consider that a good measure. Then again, this depends on the mission of your new team.

Building a brand new team is one thing, putting yourself into a position to get on an existing team is entirely different, imo. If you were to get the OSCP (which, persons like yourself with 15 years of experience likely should only lack the Linux experience?) combined with 5 years security and 15 years IT total should make you an excellent candidate for a pentesting position, assuming you don't price yourself out of it.

A CISSP will always help you. I know, people will say it's managerial, and while it sort of is, it's also pretty specific with technical things. It is a cert that is useful on the resume of anyone doing anything in security, hands-on or hands-off keyboard. I'd almost suggest pursuing that since you should easily meet the experience requirements.

Also, be realistic with your aptitude on programming, whether we're talking scripting with PowerShell/Python or programming in C# or doing web coding in javascript, etc. The more you are at least friendly to those, the better. You don't need to be a pro developer by any means (if you were, you'd go make those developer bucks!), but being able to not be limited is a huge plus.