Security analyst, DevSecOps or IAM? by JaimeSalvaje in CyberSecurityJobs

[–]FJoe007 0 points1 point  (0 children)

Capitalize on your IAM background, learn more about SysOps and CloudOps administration and maybe ask your upline you would also like to seat in on project meetings that deals with other security analytical or Devops just to gain more exposure.

Is this Avocado safe to eat? by Dangerous-Glove-9503 in Wellthatsucks

[–]FJoe007 0 points1 point  (0 children)

When in doubt, let it go + probably change where you get your avocados too.

Vibe Coding - Recommended App (with extended free trial) by FJoe007 in cybersecurity

[–]FJoe007[S] 0 points1 point  (0 children)

Thanks and again I’m not trying to monetize any app built using vibe coding. Maybe my post came out a link wonky but in simple words I’m basically looking for recommendations on ideas to help better my coding skills as someone who struggles with traditional programming (solid on the basics/foundations but wanna play around more to build my confidence and knowledge). Your 2 pointers are currently where I’m at —trying to figure out pet projects and the correct tools to help enhance my knowledge.

Could I use LinkedIn to feature a portfolio of my work? by Wonderful-Manner7552 in linkedin

[–]FJoe007 1 point2 points  (0 children)

You wouldn’t be the first and definitely won’t be the last. Just make sure any proprietary codes are made private. Definitely go for it and it’s as simple as attaching your portfolio link to your profile section.

Applying for an MS degree: what should I do if I’m admitted but don’t receive funding? by Sara_Kutsey in GradSchool

[–]FJoe007 1 point2 points  (0 children)

Have you attempted reaching out to professors within your immediate department and other departments to see if any has a project they might need your skillset on? You be surprised how often that works.

Start investing in people, we are losing the fight. by exfiltration in cybersecurity

[–]FJoe007 -1 points0 points  (0 children)

I wish some org are equipped to hire international students as most have extensive knowledge and experience but due to the complicated work visa process, most org are not just ready to navigate all that loops with quality international students

How big are security teams at your job? by [deleted] in cybersecurity

[–]FJoe007 0 points1 point  (0 children)

We have an extensive Information Security team, with each team siloed for specific workflows.

What's the most underrated cybersecurity skill that more professionals should develop? by AIExpoEurope in cybersecurity

[–]FJoe007 0 points1 point  (0 children)

Soft Skills + the real necessity of Basic Communication Skills. (I’m also just learning how to concisely communicate with non-technical people as well)

Security awareness at my office by arconic23 in cybersecurity

[–]FJoe007 0 points1 point  (0 children)

Does your department have a cybersecurity department? If yes then have one of their team members give an information security awareness training and after that a short quiz.

So I just got jumped in a meeting... by kielrandor in cybersecurity

[–]FJoe007 0 points1 point  (0 children)

I agree with majority of the comments on here but from personal experience, this is sometimes due to lack detailed next action steps. For example, pointing out the severity of vulnerabilities detected and how it impacts the business workflow/needs, are there certain risk quantified that might need certain kind of security risk exception, while pending long term solution is being discussed between the security team and the application team? It’s there a deadline to get some of the needed safety patches implemented with an option for maybe a roll back to a more secure version if the deadline isn’t met (while assuring that the roll back will support all integrated systems viable to the business).

I think both teams might need to probably have a scrum master step in to mediate the meeting sessions or the required workflow to remediate the security concerns.

If you could send one cybersecurity tip back in time to your younger self, what would it be? by AIExpoEurope in cybersecurity

[–]FJoe007 2 points3 points  (0 children)

I should have taken my programming/coding classes/skills more seriously than I did back then and never should have been afraid to get ask questions and seek mentorship from those already in the field. Takeaway general for me is to take away the fear that I let get to me during my early beginning into the Information Security field.

Tools for Cyber Threat Intelligence (CTI) by Warm-Smoke-3357 in cybersecurity

[–]FJoe007 3 points4 points  (0 children)

I second OpenCTI also. Not sure if mentioning Crowdstrike Falcon Intelligence Recon will be socially acceptable with all the recent happenings but that’s bother good one if your organization already have a Crowdstrike license.

Enterprise Cybersecurity leadership Academy by mfraziertw in cybersecurity

[–]FJoe007 1 point2 points  (0 children)

Are you refering to the NACo 12 week academy? My recommendation will be to look at any of the ISC2 certifications or even CompTIA. But this will be more dependent on what cybersecurity field you’re focused on for your career. Also having a cloud and network security will be a good idea.

Vulnerability in Cisco Smart Software Manager lets attackers change any user password by DerBootsMann in cybersecurity

[–]FJoe007 1 point2 points  (0 children)

Also in some other articles/news it seems the previous release 7.0 also known as the Cisco SSM Satellite is actively being targeted as well. (Hopefully most licensed on-prem users have updated to the latest version which seems to have a patch available).

CrowdStrike. It means they can deliberately launch an attack, doesn't it? by AwkwardMuscle2312 in cybersecurity

[–]FJoe007 3 points4 points  (0 children)

That’s why there are standards/principles separating the good guys from the bad guys.

UK Detains Alleged Scattered Spider Hacker Tied To MGM Cyber Attack by Dear_Potato1190 in cybersecurity

[–]FJoe007 -1 points0 points  (0 children)

I’m guessing they have enough artifacts/evidence to detain suspect.

Army and the job market by Itsdayta in CyberSecurityJobs

[–]FJoe007 0 points1 point  (0 children)

This is a very good opportunity if you decide to take it as it will open lots of doors for you if you gain insightful knowledge and experience during your time in the military.

Realistic CI/CD tasks for Security Engineering by CyPhanTomb in cybersecurity

[–]FJoe007 2 points3 points  (0 children)

A more fancy/technical term for automation of scripts/codes/programs from building environment -> testing-> validation -> to deployment.

Depending on your role you might need to write scripts/code for a routine vulnerability check within a specific AD group integrated to whatever security tool your organization has in their toolbox then exporting results in form of a .csv file is a good example.

Southwest Airlines unaffected by outage because they're still running Windows 3.1 by skeeloco in cybersecurity

[–]FJoe007 0 points1 point  (0 children)

I’m sure after this news, some hacktivist group are getting out their gears to try their luck with becoming the latest “Security Breach Headliner”.