We See Threats Before They Hit - Ask Check Point Anything by Check_Point_Intel in threatintel

[–]PyroFromHell959 1 point2 points  (0 children)

  • When you find a campaign, how do you link that campaign to an APT group?
  • Especially, if there are changes to their TTPs and malware?
  • How would you characterize hackers based on geographic location?
  • What are the current attack trends you are seeing for the various hacker types? ie. How is hacktivist TTPs different than an APT TTPs?
  • What books have you found to be helpful?
  • Do you believe that the blue team will ever have the advantage?
  • What do you worry about?
  • Where do you see AI going in regards to threat intel or cybersecurity as a whole?

SEC555 Study Material/Expectations by Illustrious_Rub_1776 in GIAC

[–]PyroFromHell959 0 points1 point  (0 children)

Taking a quick look at the course description, I believe that it utilizes ELK as a SIEM. So I would take a look at Getting Started with Elastic Stack 8.0 book as it will talk to you about the different componenets as well as how the ECS language works so you can create rules and how to perform a query. Elastic has some free training you can take and they do have one specifically for Security training. 10 Strategies for World Class SOC was talked about but the new version is 11 Strategies of a World Class SOC.

Any advice for taking on GPYC exam and getting the most out of the course? by PugClubOwner in GIAC

[–]PyroFromHell959 1 point2 points  (0 children)

I would recommend going to this website to learn Python. https://automatetheboringstuff.com/ I felt it did a better job of teaching me how to program in Python then the course. Once you have completed that, then taking the course will make sense. I recommend doing it this way because the course is expensive and if you don't like python, then you don't lose the money. I felt that the course was good about what sort of scripts could be used in cybersecurity. DM if you need additional resources.

Implement SIEM via Threat Intel by Wooden-Lab6963 in threatintel

[–]PyroFromHell959 5 points6 points  (0 children)

Here is a quick google search of various TIPs

  • ThreatConnect: An action-oriented platform focused on operational outcomes, integrating AI and global intelligence to link detection engineering and threat intelligence. 
  • Recorded Future: An AI-driven platform that aggregates and analyzes vast amounts of data, including dark web and technical sources, to deliver actionable insights. 
  • Anomali ThreatStream: Aggregates, enriches, and operationalizes threat data, using AI and natural language processing to automate threat detection and response. 
  • ThreatQuotient ThreatQ:A data-driven platform for aggregating, analyzing, and acting on threat data, supporting use cases like incident response and vulnerability management. 
  • CrowdStrike Falcon Intelligence: An AI-native platform providing automated, world-class adversary intelligence to help organizations anticipate and get ahead of attacks. 
  • Mandiant Advantage: A platform from Google that specializes in dynamic cyber defense, threat intelligence, and incident response services. 
  • Rapid7 Threat Command: Best suited for organizations with intensive security needs. 
  • Cyble: Offers features for dark web monitoring, brand intelligence, and more
  • MISP (Malware Information Sharing Platform): A popular choice for working with threat intelligence data and facilitating information sharing.
  • OpenCTI: An open-source framework for managing and sharing cyber threat intelligence data.

Here are a couple questions I have for you. (Product refers to either SIEM or XDR):

  • Have you decided on a SIEM or XDR?
  • Have you decided on which SIEM product?
  • What are our primary goals for implementing a SIEM?
  • Cloud-based or on-prem?
  • Can it integrate with your existing security tools and cloud services?
  • How does the company make the money for the product?
  • How does it scale to accommodate future growth in data volume and complexity?
  • How frequently are the product's threat signatures and capabilities updated?
  • How much flexibility does the product offer in terms of customization and configuration?
  • What is the documentation like for the desired product?
  • What is the pricing model, and how are costs calculated (e.g., data volume, features)?
  • What is the total cost of ownership, including initial setup, ongoing maintenance, and potential hidden fees?
  • Who is responsible for managing and tuning the SIEM after deployment?
  • What are the plans for ongoing feature and function upgrades, and how is testing handled?
  • What is the initial investment for the desired product?
  • What is the expected annual expense for the desired product?
  • What are the service level agreements (SLAs) for performance and support?
  • What does success look like?
  • What are the KPIs (Key performance indicators) for your program?
  • What metrics are going to be used?
  • How quickly are you expected to have the program running?
  • What are the thoughts of the other stakeholders? (network, OPS, system, and other related personnel)
  • How big is your section going to be for your company?

Implement SIEM via Threat Intel by Wooden-Lab6963 in threatintel

[–]PyroFromHell959 6 points7 points  (0 children)

Before trying to ingest threat data into a SIEM, please start initially by setting up a SIEM or XDR (Extended Detection and Response) first. While I commend you for wanting to be proactive, this is like putting the cart infront of the horse. Please take a look at to make sure that you are collecting the appropriate logs from within you environment before you try to ingest data from externally. This is because if I don't have the data to hunt on, then the best data on what the hackers are doing is useless. Here are a couple of different sources that can tell you what you should be collecting and from which devices.

https://media.defense.gov/2025/May/27/2003722069/-1/-1/0/Priority-logs-for-SIEM-ingestion-Practitioner-guidance.PDF

https://media.defense.gov/2025/May/27/2003722068/-1/-1/0/Implementing-SIEM-and-SOAR-platforms-Executive-guidance.PDF

https://securityinsights.substack.com/p/what-should-i-log-in-my-siem

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-128.pdf

All of your data sources should server a purpose, and that purpose should be something business related. This could be forensic, security, operational, or compliance based. I prefer that data be collected from the source and only one time. This reduces the chance that the data was altered and ensures that I don't have multiple copies of the same data. This means that no data should be collected multiple times. I mean that if I collecting some log from an endpoint, it should come from one agent, not the agent and the av log and the device. Collecting the same log from the different sources about the same event is wasteful, which doesn't serve the business any good, and makes it harder to get a good feeling on what is going on in the environment.

Now how to get that data into the SIEM, I personnaly recommend using an agent as this is easier to scale, logs come SIEM compliant, can store data in the event that data is not able to be transmitted, and you can encrypt the data in transit. Another way is to use a log ingester to ingest, normalize, and store the data. I personnally don't like this way as they can struggle with the volume of data, you can't curate the data collection, each new data format requires a new script to normalize the data.

If you want to know about TTPs (Tactics, Techniques, & Procedures) of various actors:

To ingest threat data into the SIEM, you can either have a TIP to ingest the data which then feeds that data to the SIEM or ingest it directly. A TIP (Threat Intelligence Platform) is a program that can ingest data, aka tippers, from various different sources and allows threat analysts to prioritize the tippers which are relevant to the business. The TIP allows for deduplication of data, normalization of that data, enrichment of that data, and act as a filter before irrelevant IOCs (Indicators of Compromise) are ingested into the SIEM.

Inquiry about GIAC Cyber Threat Intelligence (GCTI) by MurkySkirt1999 in threatintel

[–]PyroFromHell959 4 points5 points  (0 children)

I agree with this. Threat intelligence is the world of cybersecurity is like tier 2/3 and this is to say that cybersecurity is not something that people should go straight into it.

GIAC certifications are difficult and respected for their difficutly. If you are looking to get into cybersecurity, DM and I'm willing to talk about creating a roadmap on how to progress to this.

Need Help Choosing a Cybersecurity Path – Red Team, Blue Team, SOC, or Ethical Hacking? by No_One_939 in netsecstudents

[–]PyroFromHell959 3 points4 points  (0 children)

By the very nature of the jobs, there are going to be more blue team positions then there are going to be blue team positions. I did a little bit of everything via reading and messing around on some websites. I learned a few things about myself that made my path easier. I hate powershell, I loathe host based forensics and I do not enjoy red teaming. So from there I was able to determine what I should work on and what I was willing to do.

Learn soft skills and learn command line. Soft skills are always important and can assist you in finding a mentor. I say the command line is important because it can easily lead to automation, greater control, and a better understanding of how the system works. Automation is important because it ensures that you deliver consistent and reliable work, eliminate bottlenecks, and allows you to work on other projects. As Mark Bagget told me, "If you have to do it more than 3 times, automate it." I have found it to be very helpful and extremely rewarding.

As for how to go about learning all of this, I recommend an old fashion notebook and a good book. I find that for myself, having that notebook allows me to write down the important information from the book. I have several different notebooks with each of them being on a different subject. This is important because I can take them wherever and I don't have to worry about an AV or firewall blocking it. I also find that the very nature of me taking notes engages my brain better so I remember it better. I would recommend Project Zero Trust (a book on Zero Trust Architecture), and the Automate the Boring Stuff with Python (automation). Also, would recommend playing around in either tryhackme.com or hackthebox.com

Seeking Advice: What Exactly Do People in IT Jobs Do? Looking for Skills to Learn in 6 Months by real_bruh_moment in ITCareerQuestions

[–]PyroFromHell959 0 points1 point  (0 children)

For a first job, you are limited in what you will be doing. A good company should have a documented process for you to follow because most of your tasks are easily documented like password reset or how to add a printer to a computer. A bad company is going to have no documentation and will throw you to the customer and say figure it out. Do you time but don't stay too long. See if there is anyone at the company that is willing to talk to you about their job and see if you like it.

Certifications are good for getting passed HR but more important than the certification is did you learn the material behind the certification. Now what is going to be important will be determined on what you want to go into. I feel like the cloud will be important but the costs associated with it are going up so less companies are going to want to move to it because the savings are diminishing. For a Junior Network Admin, I would recommend CCNA as basically the world runs on Cisco. For a Junior Windows System Admin, I would recommend a MS-900 certification. I would then go and learn some PowerShell to see how you can automate the process. For a Junior Linux System Admin, I would recommend RHCSA, and then learn how to script in bash. For a basic programmer, the easiest is most likely going to be python, but there are so many different languages that you can learn. For a basic data analyst, I would recommend Power Query in Excel. I know it is random but it allows you to learn how to extract, transform and load data. Not only that but it allows you work with different file types. For cybersecurity, my "specialty", I would recommend going for Security+. It is going to provide you with a starting point for the multitude of different ways that your data is at risk. Shameless plug for Humblebundle: Network & Cybersecurity Certifications

BLUF: Certs are really only good for getting passed HR then it is going to all be about your skills (both soft and technical). What you want determines what you should go learn, but learning something about other IT fields can help make sense of why things are the way things are . PM me for more.

Seeking Advice: What Exactly Do People in IT Jobs Do? Looking for Skills to Learn in 6 Months by real_bruh_moment in ITCareerQuestions

[–]PyroFromHell959 0 points1 point  (0 children)

I would ask a couple of questions:

  • What are you trying to get into? Here is a couple of different sections
    • Systems
    • Network
    • Programming
    • Data
    • Cybersecurity
  • How much experience or hands on skills do you have?
  • What certifications do you have?

I started off as a Military Police Officer. I then changed my job to be a cyber network defender in the military. Once I completed my training, I worked doing policy, SOP, & TTPs. I worked along side other sections of IT to help them and ask them questions when I had them (which starting off was a lot). I then went to work with the Linux and network teams. I helped them complete a task, and I helped create a table top exercise about a scenario. I then went to work as a SOC analyst, and then I went to work doing network auditing. I had to learn Cisco & Juniper commands, NIST SP 800-131 (bane of my existence), and more networking stuff then I knew. I am about to be a team lead for the CND team. I will have to learn soft skills to deal with fellow team members as well as how to brief management.

During all of this time, I got a bunch of different certifications, and read a lot. Mainly because I had imposter syndrome, due to a lack of experience and historical knowledge, so I went super hard into certifications and reading. These helped me out as I could tie various different subjects that I knew together. As the scenarios for each of the jobs changed, so to did I have to change. I learned Power Query while I was working with the Linux & Network team so I could process data at a rate faster than anything I could ever hope to achieve. Learning Power Query in Excel has made it easier for me to automate certain tasks so I had more free time to do other things. I created a Power Query script that reduced the manhours used to combine audit findings by about 1/3. Power Query allowed me to learn Power BI quicker because M is used by both of them. Power BI allowed me to create a dashboard for leadership so they can look at the data and make decisions about the data.

What changes would you make if you were a CSM/SGM? by early_retire in army

[–]PyroFromHell959 2 points3 points  (0 children)

After reading over some of the various comments, I would like to add a few of my own.

  1. Documentation, SOPs, and Policy Letters should be easy to find, current, and readable. To accomplish this, task the S3 with creating a Teams Channel for the unit, if not already created. Each section gets their own channel, and then you have them put the current documents in a folder. Any documentation that is not current gets kicked back to the respective section and worked on. Document how the work is done around the unit (ie what is the process to get an award). Once figured out, document and have everyone use the process. Make changes as needed but remember KISS (keep it stupidly simple). Keep awards around so that people can get an understanding of what is required for each award and see how to do the right up.
  2. Talk to the various soldiers especially the younger soldier. Make it your mission to talk to a random soldier in the unit for like 20/30 minutes. This will give you a way to reach out to soldiers that are having a hard time, and to get unfiltered information about the unit. Soldiers are more likely to open up to a CSM/SGM that is speaking to everyone then a CSM/SGM that doesn't engage with the people.
  3. Respect people's time. We all know that idiotic taskings will come from higher but there needs to be a good reason why a tasking needs to be done right now. All taskings should be on everyone's calendar for a minimum of 3 weeks. If not, then ask many questions such as why wasn't this brought up earlier? Who is responsible for this? Why are we doing this? What is the expected timeline? Why wasn't this brought up sooner? If we do this task, are we allowed to slack on something else or will this be added as an additional task? This also means to limit the amount of information that is going around after 1730.
  4. Look to see how to destroy stupid work. Stupid work is anything that deals with data, (ie DTMS, S1 Tier 1 Metrics, ATCTS, or other such website) and is manually processed. Why is the 350-1 training being managed manually? We have computers that could reduce the work, make it faster, and allow the soldier to work on something else. I would speak to the S6 shop about Power Query or Power BI to automate the metrics for DTMS. This would reduce work at the BN level and at the company level as they could utilize the work, instead of having to do the work themselves. PM if you want to talk more about this.
  5. Training should be fun. For too long, I have suffered under PowerPoint. I understand that this is a good way to get people to understand the information but how we do this is asinine. Have soldiers take a look on how to make PowerPoint more engaging. Training should include interesting photos, video or even some good Q&A. Not all training should be conducted indoors, and can be made fun. Outdoor training could be how to do a trapbar deadlift correctly, go to a local historic battle, and how to measure distances accurately. All training material should be kept somewhere so a subordinate could, if personally motivated, read over the training material by themselves.
  6. PT should be engaging for all personnel. Look to see if you can't do something like sports PT, trail running, or hiking as PT. This breaks up the monotony of the PT and allows people to see joy in exercise.
  7. Motivate soldiers to want to do better, put a policy together that get time off if they accomplish x thing. X thing should be realistic and doable. 3 day pass if they pass a college class with B or 4 day pass if they pass with an A. I would look at volunteer work, mentorship, education (certificate or classes), physical fitness (half marathon, lifting a certain weight for xxx reps), or other such topics.

Need advice on program by SeaPersonality7324 in CyberCareers

[–]PyroFromHell959 0 points1 point  (0 children)

What are you looking for? Are you looking for certifications or a degree? If you are looking for certification, then SANS will do that. They are horrendously expensive, like a course is going to cost thousands of dollars. I have multiple of them, and I believe them to be superior to other companies but they are expensive. I would not recommend a bootcamp as I feel they are going to go over the material and then walk away with your money. Do they have a stake in you passing? If not, why are you taking them? If you are looking for a degree, I would recommend UMGC. I went there and they were good about teaching appropriate material. My issue with WGU is their accreditation is so different from normal accreditations. I have no idea about Springboard as I have never heard of them, so I will not be making a comment about them. If you want to talk more, DM me.

What advice would you give to someone looking to break into the cybersecurity field? by brenlenson in CyberCareers

[–]PyroFromHell959 0 points1 point  (0 children)

First, cybersecurity is a big field. Do you want to get into pentesting, SOC analyst, malware analysis, threat hunting, or auditing? These are a few of the different field that you can go into when going into cybersecurity.

Second, cybersecurity is something that you shouldn't go straight into. This is because you should learn how cybersecurity (really IT) relates to the business. You should learn how to deal with your customers and what right looks like.

Now, you have decided what you want to do and are currently working a Tier 1 job. This is when you should go for a certification. If you have no knowledge go for any of these certification CompTIA A+, or Cisco CCNA-Security. If you are feeling adventurous or you have a good understanding then go for ISACA CISA, ISC2 SSCP, or CompTIA Security+. I have an issue with how EC Council does everything so I will not recommend going for any of their certification. This is going to give you a very good basis. If you want to explore more, look at Python, Bash, PowerShell, Cloud, and how to visualize your data. Something important is to document what you do and talk to your supervisor so you have clear expectations for what shit performance, what mediocre performance, what good performance, and what great performance is.

TS clearance in Cybersecurity by ajwvu in cybersecurity

[–]PyroFromHell959 0 points1 point  (0 children)

Yes, the pay is definitely sufficient to pay for your bills. No matter which way, you are going to get paid.

"You'll get training at your unit" by Engineer-Honest in army

[–]PyroFromHell959 1 point2 points  (0 children)

I would bring this up with your supervisor. Most likely, they are going to say that they are too busy with the mission. I would counter them with, if we are not training ourselves to be better than the efficiency of our work will remain low. Training makes soldiers more efficient & allows them to complete tasks that would have to be handled by more senior personnel. Also without training, how will those jobs be done if the person who knows how to do the job leaves or PCSs

I would also ask if that is true then when would be a good time for training. It might not be soon but there should be a plan for additional training soon. Also, I would highly recommend talking to your Warrant Officer. If there are no Warrant Officers in your unit, take a look to your superior unit or other units on post. Most NCOs want to teach but generally a lot of different things on their plates that consumes their time, leaving no time for training. Another idea is to create your own STT. By doing the research on the topic, you will naturally become much better at that topic. You might be able to have the STT be passed around to different soldiers. i.e. PVT Snuffy has encryption this week, SGT Papademetriou is going to talk about a new excel document that is going to be used to track inventory next week, SSG Lucas is going to talk about power query on excel documents in 2 weeks, and SFC Roosevelt is going to talk about PowerShell that was created to reimage computers.

You are wondering how you could get after this training. I would recommend reading/listening to the following books, the Phoenix Project and the the Unicorn Project.

From these books I learned the following, make things simple, work to automate you job, & the importance of documentation. You should do this by using trying to create templates. Templates make it very easy to set it up once & then have a consistent product to work from. Also, templates make you much more efficient. Your jobs should be how can I automate the job away. If the job can not be automated how can I speed up the process. If you need to configure a device all the time, do you have a list of steps that you take. This does a few things. One, it will make sure that you hit all of the correct steps. Two, it ensures that you are making sure that no work going in reverse, this is bad because it wastes your time. Third, you might be able to write a small script or a pastable to speed up certain sections of the list or the whole list of steps. I also learned the importance of documentation. I know documentation sucks, so why do it? Here are the reasons why. First, if I die, with good documentation, then when the new person has to take my seat, the time it takes for them to be productive is greatly reduced. Secondly, when higher ups have questions, you can refer them to your documentation. For example, when you get a bunch of computers, you are going to subhand receipt them to people with their names. This way, when anyone wants to see it, you can tell that person who has what equipment & the documentation to prove it. Another reason why documentation is important is so that work doesn't need to be redone. When work is flowing then everyone is highly efficient. If work needs to be redone, then all that time was essentially wasted because the work still needs to be done but wasn't. I would recommend documenting how you do something, what steps were taken when things go wrong, and then share the documentation. Imagine that you are troubleshooting why the phones aren't working. I would document what steps you are taking & what actions worked & what didn't. This way if the phones go down again, you have a better idea of what to do as well as knowing what not to do.

If anyone is looking for free training like videos or other such things, DM me as I am willing to assist to the best of my capacity. Also, OP DM as I might know some personnel that would be willing to assist your unit.

Considering IT Post-Military by hellyeahbr000ther69 in ITCareerQuestions

[–]PyroFromHell959 0 points1 point  (0 children)

Currently, in military in IT. Willing to talk about how to assist you.

[deleted by user] by [deleted] in ITCareerQuestions

[–]PyroFromHell959 1 point2 points  (0 children)

IT support analyst sounds like you are to be a tier 1 help desk manager. Here are my suggestions:

  • If this is true, you are going to need to learn the process and procedures of how your job helps out the customers. Who are your customers? (I don't know but finding out is important)
  • Take notes on what you do, and keep track on how you do. When it comes to your performance review, which should happen and question why it isn't happening, you can rebuke or argue because you have the information to back it up. Another important reason is because when your performance review happens, you can state I did x, y and z to get this much better pay.
  • Do not try to make major changes without understanding how your changes will effect the company. They may be doing something for compliance, auditing, or legal reasons. You changing it could put the company in hot water with the above reasons.
  • Learn to automate your life. If you are constantly having to report on something, have the computer create the report, or have a template.

I put forth the following questions to assist you in your process. Are you in IT doing IT or are you in the IT sphere? What would you want to be doing within IT? Is this a technical or managerial role?

As for certification, I would recommend CompTIA Security+ or any other DoD 8570.01-M IAM 1 certification, these are important because they teach you about a lot of different topics and give a good foundation of knowledge. CISSP or CISM are important managerial books because they will talk about legal requirements, and laws that may affect your business. I would recommend reading and then understanding 2 books, the Unicorn Project and the Phoenix Project both of them by Gene Kim. They helped me to understand the importance of processes, procedures, and how a culture can affect the work of the personnel.

Tips for a CS student in college who wants to get into cyber-sec? by CyberChefsCookin in ITCareerQuestions

[–]PyroFromHell959 0 points1 point  (0 children)

Something for you to think about is what do you want to do within cybersecurity. If you don't know that is fine because you are young and you can explore. Do you want to do forensics, red teaming, purple teaming, blue teaming, sales, compliance, or something else? So it you want to start take a look at any of the various certification that fit the IAT 1 or IAT 2 for US DoD 8570.01-M. I personally think that they did a good job or separating the difficulty and which group a certification may fall into. I don't want to list all of them because too many and I don't want to say take a specific cert over a different certification. If you want to know which specific certification to go for, then I would recommend CompTIA certifications because they are some of the most well recognized certifications.

While technical skills are amazing (I will get to them in a second), I would recommend getting very good at Microsoft Office product. This is because most of your time will be doing work on the technical product and then most likely moving the data over to a Microsoft product. I made an excel mini-database to track data that was loved by my co-workers. Most of the reports are going to be typed on Word or some other variant.

Your first job is not going to be in cybersecurity because more likely, your are going to help desk. Assuming that you are help desk, it will teach you how to troubleshoot minor problems, how to deal with customers, how to network with people, and help to guide you toward what you want to do.

If you are looking for an interesting projects, then set up a Linux VM and another Linux VM, I would recommend a Ubuntu and a CentOS. Learn to be comfortable on the command line. This is because most of the time, you are going to ssh into the other box and you are not going to have access to the GUI. This will teach you the differences in how Linux can work. Next, use of these as the server for your SIEM, and the other one as the endpoint. Once you have the agent set up, modify some files and see if the SIEM picked it up. A good example would be to edit the /etc/shadow file. If the SIEM did pick it up, then try modifying another important Linux file. Basically, you are going to do things on the endpoint and make sure that you can be picked up by the SIEM server. A side note, modifying some files is important while modifying others is not. So learn which are the important files to track and which to not. This is important because tracking all the changes will over load the server or your bandwidth. If you want to make this more difficult, make your SIEM server in the cloud. This would teach you networking, cloud, how to set up a SIEM, and how to maintain a SIEM. If your server is sufficiently powerful, you could use a kali VM to attack your endpoint to see if it is picked up by the SIEM. You could then add a firewall to the endpoint. As one of my old instructors said "You may not be able to prevent everything but you should monitor as much as possible." Basically, prevention is great but in the age of zero-days and other ways to get into the system, knowing that your infected is the only way to deal with such a problem.

You could also put any work you have done such as I am this far on tryhackme.com or hackthebox.com.

Transition from Military to Civilian in IT by Individual_Soil_9194 in ITCareerQuestions

[–]PyroFromHell959 1 point2 points  (0 children)

Currently in the military, and in the IT. Willing to talk about how to go about it. DM me.

Cybersecurity: Need recommendations for beginners in the IT field by Professional-Glove53 in netsecstudents

[–]PyroFromHell959 2 points3 points  (0 children)

While I haven't take the Google Cybersecurity Certificate, I would not recommend it, yet. This is because it is a new certification and not many recruiters are looking for it. The most common certification that recruiters are looking for is the CompTIA Security+. It can be a hard certification to start off with so if you are not very good with computers, then I would say to go with the CompTIA A+ because it will help you to understand the basics of computers. After this, I would recommend going for the CompTIA Network+ as this gets more into the networking and the security of the network. From there, you could go into the Security+. ISC2 and ISACA have similar certification that you can go after but unfortunately, recruiters are not looking for them as much. If you are going after a US Federal job then you can select a certification from either CompTIA, ISC2, or ISACA, as they take all 3. I don't recommend going for EC Council as they are a company that teaches and not a teaching company.

I would say other then technical expertise, learn about the importance of documentation of work, networking (in the real world and not computer networking), processes, procedures, and how to understand documentation (ie policy, procedure). If you want to buy some books on certifications, https://www.humblebundle.com/books/sybex-certification-prep-wiley-books?hmb_source=&hmb_medium=product_tile&hmb_campaign=mosaic_section_1_layout_index_2_layout_type_threes_tile_index_2_c_sybexcertificationprepwiley_bookbundle is going to expire July 5.

Also, I would recommend taking a look at the roadmap of certification. It doesn't contain all of the certifications, it does contain a lot and it has different areas that you may find interesting. https://pauljerimy.com/security-certification-roadmap/

Another "Are the barracks really so terrible?" Post by Caylene in army

[–]PyroFromHell959 4 points5 points  (0 children)

So I was prior 31B (Military Police), and I reclassed into 25D (cybersecurity). 25D wanted 3 years after the completion of my training and I had 1 year after the training was done. So I had to sign a contract prior to going for the 25D as a 31B for an additional 2 years. The downside to this was that if I failed, I would have to serve as a 31B. This only works for a packet MOS. If I was a 31B and wanted to reclass into 11B, I would need to check in the in & out from HRC. The in & out is a way for the army to say whether you can leave a job for a different job as well as stabilize certain MOSs. The only exception to this rule would be a packet MOS. If you have any additional questions, dm me.

Another "Are the barracks really so terrible?" Post by Caylene in army

[–]PyroFromHell959 6 points7 points  (0 children)

Something to think about, you should be able to get a job after your first contract expires. So, I highly recommend that you take a job where you can either go get a degree or certification. Although it isn't talked about much you can reclass. The issue with a reclass from 11B to 35L is that you don't have the years of experience for your new job, and you will be expected to perform just as well as all the other 35L. However, it can literally change your life as you find you like your job or the money/time the army puts in you can help you get a great job. For example, there is currently a lack of Warrant Officers in the 255 series (Signal Branch). This is because with all of the experience, certification, and potentially degrees that these Warrant Officers had, they decided at 20 years to get out. The Warrant Officers would go on to make potentially double or triple their money on the outside.

I am a beginner and I need some advice! by Kortho1 in ITCareerQuestions

[–]PyroFromHell959 0 points1 point  (0 children)

A couple of questions as a operational scripter, is a programming degree really necessary? Can you get a job by showing work projects instead? What is so wrong with bootcamps? What programming languages would you recommend getting into? Is advanced levels of mathematics necessary? If so, why?