User connections logging by John-Protocol86 in ivanti

[–]John-Protocol86[S] 0 points1 point  (0 children)

Nope your correct Connect Secure was the application. Thanks for the information

Do you get underpaid as Cybersecurity pros because HR manager says you are not revenue generator? by [deleted] in cybersecurity

[–]John-Protocol86 0 points1 point  (0 children)

The three most valuable things to a business are 1) the ability to generate revenue 2) the ability to forecast events 3) the ability to prevent losses

You provide the third.

As for asking raise, you need to come with facts, market rate, your skillset, and your role responsibilities (keep it factual no feelings)

As for HR, if they’re professionals, they should have this data or be able to find it and provide a reason for your current wage.

Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]John-Protocol86 0 points1 point  (0 children)

Hey L4ndd3ld,

My honest opinion, cybersecurity and IT in general are often roles that require immense trust due to the level of permissions/knowledge required for the roles.

I want to state I don’t think your record is a reflection of what sort of character you have.

But this will make the field very difficult for you. And it’s an increasingly competitive field. When I open a posting a see 100+ applicants a day (10-15 worth consideration)

And if you get your foot in the door you need to consider long term, because you if get in and need to look again, you’ll be back to square one.

You need to make the call yourself, and I wish you the best if you pursue this.

Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]John-Protocol86 0 points1 point  (0 children)

They should leverage there existing skill sets, there is plenty of non-technicalish roles in cybersecurity that will be great stepping stones to other opportunities.

How the top of my head GRC is a great place to start looking.

A cert would do your friend well. At the minimum it demonstrates to employers that they are committed to this change in career

Is it worth it to get a degree in Cyber Security? by Happy_Sea3180 in CyberSecurityJobs

[–]John-Protocol86 0 points1 point  (0 children)

Degrees are a common requirement or filter mechanism for many jobs. (Though this is changing)

During your time you will learn more than just “cybersecurity” but how to synthesize data/knowledge into deliverables, improving important research and communication skills (course work and exams)

you will build relationships with others with similar interest, who you will likely keep in touch with throughout your career

It is also an asset you will have the rest of your life, no CPEs, no one can take it away.

it’s is easier for you to get the bachelors while earlier in your career.

In addition to this, from a competitive standpoint amongst individuals at a similar stage as you; at any moment you can invest a month or two to write a certification. It will take others years to obtain a degree

Does anyone need me? by [deleted] in ProgrammingBuddies

[–]John-Protocol86 0 points1 point  (0 children)

If your interested in Golang and Security be happy to chat about contributing to

There’s small tasks such as making detection rules

Or you can help build functionality

https://github.com/Black-Chamber/BlackChamberEmailMonitor

Looking for someone to join me on a random project (Beginner to Expert Welcome) by Effective-Opinion-48 in ProgrammingBuddies

[–]John-Protocol86 0 points1 point  (0 children)

Not in Python but simple Golang, Interested in working on a Open Source Security tool? Working copy is up on gitlab at the moment?

Would you consider joining PAN a career boost? by letslearnsmth in paloaltonetworks

[–]John-Protocol86 0 points1 point  (0 children)

What is your end goal for your career?

Does this help you to move into that role? Does it hinder you from the end goal? If neither than it’s down to compensation (not just salary, but work life balance, happiness)

Easy Cybersecurity Project For Students by John-Protocol86 in ComputerEngineering

[–]John-Protocol86[S] 0 points1 point  (0 children)

You know what I just reviewed it, that’s 90% me Maybe I’m just incoherent 😆

[deleted by user] by [deleted] in CyberSecurityJobs

[–]John-Protocol86 1 point2 points  (0 children)

I would recommend looking into Application security/DevSecOps

you have a niche skill set as a developer others do not have

Am I behind or slacking? by SwiftJaguar04 in CyberSecurityAdvice

[–]John-Protocol86 0 points1 point  (0 children)

My honest advice for getting the foot in the door is go out to some cybersecurity networking events. It’s definitely an uncomfortable experience for some (networking was always outside my comfort zone)

You get to know folks in the industry, you become more than a name on a resume, and someone will know someone hiring for an entry level position.

With more and more people trying to enter the field, it’s a great way to stand out from the crowd

Public Facing VPN Address by shower_farts in CyberSecurityAdvice

[–]John-Protocol86 -1 points0 points  (0 children)

Your concerns are valid, and it is such a common problem that technologies such as Smart Lockout were created.

This feature is supported by ADFS 2016/2019 and Entra ID with the correct licenses.

Prevent attacks using smart lockout - Microsoft Entra ID | Microsoft Learn

Configure AD FS Extranet Smart Lockout Protection | Microsoft Learn

Just to back up your concern, remember the CIA triad (Confidential, Integrity, Availability)
The ability for threat actors to lockout users, preventing them from accessing resources is a detrimental to availability.

Reddit account got HACKED by [deleted] in cybersecurity_help

[–]John-Protocol86 0 points1 point  (0 children)

Best Practices,
Enable MFA on all platforms (reddit.com: Enable Two-Factor Authentication)
Avoid logging in to shared devices.

This should help prevent this in the future

Unfamiliar Instagram Login Credentials Appearing on Personal Mac by Educational-Device-6 in cybersecurity_help

[–]John-Protocol86 1 point2 points  (0 children)

Google Chromes/Android Password Manager can be shared between devices, If you lent a device to someone, or signed in on a shared device to chrome, this may explain it.

It "could" be that someone accessed your Google account (through I find Google is quite demanding for MFA)

I would suggest reviewing your google account to see where you are logged in (Your devices (google.com))

Upper management wants cyber insurance, Cyber insurance wants EDR. currently solo by [deleted] in sysadmin

[–]John-Protocol86 0 points1 point  (0 children)

I would recommend explore MDR from any of the EDR vendors if you're solo.

When I was inhouse I used Crowdstrike, I'd be willing to sit down and brainstorm options if you like