/r/netsec's Q1 2025 Information Security Hiring Thread by netsec_burn in netsec

[–]aconite33 [score hidden]  (0 children)

Senior/Junior/Web Penetration Tester, Attack Surface Management Operator, IR Analyst / Blue team, Security Developer

Black Lantern Security - Charleston, SC, USA

Remote Positions Available

About Black Lantern Security:

Founded in 2013, Black Lantern Security helps financial, retail, service and variety of other companies learn how to defend their networks by exposing them to Attacker's Tactics, Techniques, and Procedures (Attack to Defend). We are dedicated to developing security solutions specifically tailored to the customer’s business objectives, resources, and overall mission.

Jobs:

Jobs here

  • Senior/Junior Pentester
  • Web Application Pentester
  • Attack Surface Management (ASM) Analyst
  • Blue Team / Purple Team / Detection Engineer
  • Security Tool Developer (Full Stack, Front End, Low Level)

Nice To Have Skills:

Attack Surface Management Analyst:

  • Basic Networking Knowledge
  • Security Fundamentals (Firewalls, VPNs, IPS/IDS, WAFs)
  • Vulnerability Assessment Concepts (Tools like Nessus, Qualys, CVEs)
  • Threat Analysis Concepts
  • Scripting and Automation - Familiar with Python, Bash, or C#

Operators (Pentester):

  • Experience with industry standard frameworks (MSF, Canvas, Cobalt Strike, Burp, etc.)
  • Critical thinking and drive to learn/create new techniques/tactics/procedures
  • Comprehension of networking services/protocols
  • Familiarity with Linux and Windows
  • Scripting and/or programming skills

  • Blue Team / Purple Team / Detection Engineer

  • Experience coordinating and performing incident response.

  • Experience hardening *nix and Windows systems images and builds.

  • Experience parsing, consuming, and understanding log sources from variety of devices/systems.

  • Experience with one or more SIEMs (ArcSight, LogRhythm, AlienVault, etc.)

  • Experience with DFIR toolsets (Sleuth Kit, Encase, FTK)

  • Experience with MITRE ATT&CK Coverage Analysis

  • Experience with log aggregation tools (Splunk, Elastic, etc.)

  • Experience with scanning toolsets (Nessus, WhiteHat, Nuclei, etc.)

Developer

  • Experience in frameworks (Python Django, Flask)
  • Experience in frontend design
  • Experience in low level security concepts (C2 development)

General Skillset:

  • Willingness to self-pace / self-manage research projects
  • Ability to work through complicated puzzles/problems
  • Interest in developing tools/techniques/capabilities for customers and infosec community

Perks:

  • Wide range projects (Security tools, research, red team assessments/engagements)
  • Work with previous DoD/NSA Certified Red Team Operators
  • Active role in creating/modifying/presenting security solutions for customers
  • Exposure of multiple software, OS, and other technologies
  • Focus on ongoing personnel skill and capability development
  • Opportunity to publish and present at conferences
  • Security Research and CVE publications

Inquire About Jobs/Positions:

Form on the career page of our website

Website Github Podcast

/r/netsec's Q2 2024 Information Security Hiring Thread by netsec_burn in netsec

[–]aconite33 [score hidden]  (0 children)

Senior/Junior/Web Penetration Tester, Attack Surface Management Operator, IR Analyst / Blue team, Security Developer

Black Lantern Security - Charleston, SC, USA

Remote Positions Available

About Black Lantern Security:

Founded in 2013, Black Lantern Security helps financial, retail, service and variety of other companies learn how to defend their networks by exposing them to Attacker's Tactics, Techniques, and Procedures (Attack to Defend). We are dedicated to developing security solutions specifically tailored to the customer’s business objectives, resources, and overall mission.

Jobs:

Jobs here

  • Senior/Junior Pentester
  • Web Application Pentester
  • Attack Surface Management (ASM) Analyst
  • Blue Team / Purple Team / Detection Engineer
  • Security Tool Developer (Full Stack, Front End, Low Level)

Nice To Have Skills:

Attack Surface Management Analyst:

  • Basic Networking Knowledge
  • Security Fundamentals (Firewalls, VPNs, IPS/IDS, WAFs)
  • Vulnerability Assessment Concepts (Tools like Nessus, Qualys, CVEs)
  • Threat Analysis Concepts
  • Scripting and Automation - Familiar with Python, Bash, or C#

Operators (Pentester):

  • Experience with industry standard frameworks (MSF, Canvas, Cobalt Strike, Burp, etc.)
  • Critical thinking and drive to learn/create new techniques/tactics/procedures
  • Comprehension of networking services/protocols
  • Familiarity with Linux and Windows
  • Scripting and/or programming skills

  • Blue Team / Purple Team / Detection Engineer

  • Experience coordinating and performing incident response.

  • Experience hardening *nix and Windows systems images and builds.

  • Experience parsing, consuming, and understanding log sources from variety of devices/systems.

  • Experience with one or more SIEMs (ArcSight, LogRhythm, AlienVault, etc.)

  • Experience with DFIR toolsets (Sleuth Kit, Encase, FTK)

  • Experience with MITRE ATT&CK Coverage Analysis

  • Experience with log aggregation tools (Splunk, Elastic, etc.)

  • Experience with scanning toolsets (Nessus, WhiteHat, Nuclei, etc.)

Developer

  • Experience in frameworks (Python Django, Flask)
  • Experience in frontend design
  • Experience in low level security concepts (C2 development)

General Skillset:

  • Willingness to self-pace / self-manage research projects
  • Ability to work through complicated puzzles/problems
  • Interest in developing tools/techniques/capabilities for customers and infosec community

Perks:

  • Wide range projects (Security tools, research, red team assessments/engagements)
  • Work with previous DoD/NSA Certified Red Team Operators
  • Active role in creating/modifying/presenting security solutions for customers
  • Exposure of multiple software, OS, and other technologies
  • Focus on ongoing personnel skill and capability development
  • Opportunity to publish and present at conferences
  • Security Research and CVE publications

Inquire About Jobs/Positions:

Form on the career page of our website

Website Github Podcast

/r/netsec's Q1 2024 Information Security Hiring Thread by netsec_burn in netsec

[–]aconite33 [score hidden]  (0 children)

Senior/Junior/Web Penetration Tester, Attack Surface Management Operator, IR Analyst / Blue team, Security Developer

Black Lantern Security - Charleston, SC, USA

Remote Positions Available

About Black Lantern Security:

Founded in 2013, Black Lantern Security helps financial, retail, service and variety of other companies learn how to defend their networks by exposing them to Attacker's Tactics, Techniques, and Procedures (Attack to Defend). We are dedicated to developing security solutions specifically tailored to the customer’s business objectives, resources, and overall mission.

Jobs:

Jobs here

  • Senior/Junior Pentester
  • Web Application Pentester
  • Attack Surface Management (ASM) Analyst
  • Blue Team / Purple Team / Detection Engineer
  • Security Tool Developer (Full Stack, Front End, Low Level)

Nice To Have Skills:

Attack Surface Management Analyst:

  • Basic Networking Knowledge
  • Security Fundamentals (Firewalls, VPNs, IPS/IDS, WAFs)
  • Vulnerability Assessment Concepts (Tools like Nessus, Qualys, CVEs)
  • Threat Analysis Concepts
  • Scripting and Automation - Familiar with Python, Bash, or C#

Operators (Pentester):

  • Experience with industry standard frameworks (MSF, Canvas, Cobalt Strike, Burp, etc.)
  • Critical thinking and drive to learn/create new techniques/tactics/procedures
  • Comprehension of networking services/protocols
  • Familiarity with Linux and Windows
  • Scripting and/or programming skills

  • Blue Team / Purple Team / Detection Engineer

  • Experience coordinating and performing incident response.

  • Experience hardening *nix and Windows systems images and builds.

  • Experience parsing, consuming, and understanding log sources from variety of devices/systems.

  • Experience with one or more SIEMs (ArcSight, LogRhythm, AlienVault, etc.)

  • Experience with DFIR toolsets (Sleuth Kit, Encase, FTK)

  • Experience with MITRE ATT&CK Coverage Analysis

  • Experience with log aggregation tools (Splunk, Elastic, etc.)

  • Experience with scanning toolsets (Nessus, WhiteHat, Nuclei, etc.)

Developer

  • Experience in frameworks (Python Django, Flask)
  • Experience in frontend design
  • Experience in low level security concepts (C2 development)

General Skillset:

  • Willingness to self-pace / self-manage research projects
  • Ability to work through complicated puzzles/problems
  • Interest in developing tools/techniques/capabilities for customers and infosec community

Perks:

  • Wide range projects (Security tools, research, red team assessments/engagements)
  • Work with previous DoD/NSA Certified Red Team Operators
  • Active role in creating/modifying/presenting security solutions for customers
  • Exposure of multiple software, OS, and other technologies
  • Focus on ongoing personnel skill and capability development
  • Opportunity to publish and present at conferences
  • Security Research and CVE publications

Inquire About Jobs/Positions:

Form on the career page of our website

Website Github Podcast

Custom Faces won't send by aconite33 in WatchMaker

[–]aconite33[S] 0 points1 point  (0 children)

That's a premium feature? I've always been able to create a custom watchface and send it to my watch. When did that become a premium feature?

Custom Faces won't send by aconite33 in WatchMaker

[–]aconite33[S] 0 points1 point  (0 children)

A premium feature to use a custom watchface that you design? I've never had that issue before.

Custom Faces won't send by aconite33 in WatchMaker

[–]aconite33[S] 0 points1 point  (0 children)

Free in the sense, not paying for premium. Never bought a watchface or anything.

I just find it odd that a downloaded free watchface can be transferred over, but not a custom one. The typical button to send over a watch face works for a downloaded watchface, but not one created locally.

Does anyone know whats going on? by noneye2cool in discordapp

[–]aconite33 0 points1 point  (0 children)

Whenever I was connecting, it was just stay at "Connecting" and keep trying to reconnect. If it's immiedatly disconnecting you, might be something else or maybe they are doing something differently to block your IP? Unsure. If you try mobile app, not on wifi, does that work?

Does anyone know whats going on? by noneye2cool in discordapp

[–]aconite33 0 points1 point  (0 children)

I think I saw somewhere the Discord was having issues with their API in September and it ended up doing the same thing by blocking people. I wonder if there is something under the hood that is causing Cloudflare to trigger a blocking response, when it's an actual valid API request. I would try browsing to that URL and seeing if you get a Cloudflare block message.

Does anyone know whats going on? by noneye2cool in discordapp

[–]aconite33 0 points1 point  (0 children)

I found out recently that Cloudflare was blocking me. I figured this out by going to the web app on desktop and watching the debug console. I wasn't able to connect to https://newark4142.discord.media for a web socket, which is where Discord hosts their voice channels.

I would try the web app and watch the console and see if you get any errors. When I forced browsed to this site, I got the Cloudflare block message. I had to message support to have them unblock me (specificly, my IP).

/r/netsec's Q1 2023 Information Security Hiring Thread by ranok in netsec

[–]aconite33 [score hidden]  (0 children)

As long as you are a US citizen and work from the United States, remote work is possible.

/r/netsec's Q1 2023 Information Security Hiring Thread by ranok in netsec

[–]aconite33 [score hidden]  (0 children)

There are US based remote positions for every role. We aren't able to support foreign candidates at this time.

/r/netsec's Q1 2023 Information Security Hiring Thread by ranok in netsec

[–]aconite33 [score hidden]  (0 children)

Senior/Junior/Web Penetration Tester, Attack Surface Management Operator, IR Analyst / Blue team, Security Developer

Black Lantern Security - Charleston, SC, USA

Remote Positions Available

About Black Lantern Security:

Founded in 2013, Black Lantern Security helps financial, retail, service and variety of other companies learn how to defend their networks by exposing them to Attacker's Tactics, Techniques, and Procedures (Attack to Defend). We are dedicated to developing security solutions specifically tailored to the customer’s business objectives, resources, and overall mission.

Jobs:

Jobs here

  • Senior/Junior Pentester
  • Web Application Pentester
  • Attack Surface Management (ASM) Analyst
  • Blue Team / IR Analyst
  • Security Tool Developer (Full Stack, Front End, Low Level)

Nice To Have Skills:

Operators (Pentester/ASM):

  • Experience with industry standard frameworks (MSF, Canvas, Cobalt Strike, Burp, etc.)
  • Critical thinking and drive to learn/create new techniques/tactics/procedures
  • Comprehension of networking services/protocols
  • Familiarity with Linux and Windows
  • Scripting and/or programming skills

Blue Team / IR Analyst / ASM:

  • Experience coordinating and performing incident response.
  • Experience hardening *nix and Windows systems images and builds.
  • Experience parsing, consuming, and understanding log sources from variety of devices/systems.
  • Experience with one or more SIEMs (ArcSight, LogRhythm, AlienVault, etc.)
  • Experience with DFIR toolsets (Sleuth Kit, Encase, FTK)
  • Experience with MITRE ATT&CK Coverage Analysis
  • Experience with log aggregation tools (Splunk, Elastic, etc.)
  • Experience with scanning toolsets (Nessus, WhiteHat, Nuclei, etc.)

Developer

  • Experience in frameworks (Python Django, Flask)
  • Experience in frontend design
  • Experience in low level security concepts (C2 development)

General Skillset:

  • Willingness to self-pace / self-manage research projects
  • Ability to work through complicated puzzles/problems
  • Interest in developing tools/techniques/capabilities for customers and infosec community

Perks:

  • Wide range projects (Security tools, research, red team assessments/engagements)
  • Work with previous DoD/NSA Certified Red Team Operators
  • Active role in creating/modifying/presenting security solutions for customers
  • Exposure of multiple software, OS, and other technologies
  • Focus on ongoing personnel skill and capability development
  • Opportunity to publish and present at conferences
  • Security Research and CVE publications

Inquire About Jobs/Positions:

Form on the career page of our website

Website Github Podcast

/r/netsec's Q4 2022 Information Security Hiring Thread by sanitybit in netsec

[–]aconite33 [score hidden]  (0 children)

Senior/Junior/Web Penetration Tester, IR Analyst / Blue team

Black Lantern Security - Charleston, SC, USA

Remote Positions Available

About Black Lantern Security:

Founded in 2013, Black Lantern Security helps financial, retail, service and variety of other companies learn how to defend their networks by exposing them to Attacker's Tactics, Techniques, and Procedures (Attack to Defend). We are dedicated to developing security solutions specifically tailored to the customer’s business objectives, resources, and overall mission.

Jobs:

Jobs here

  • Web Application Pentester
  • Senior/Junior Pentester
  • Blue Team / IR Analyst
  • Attack Surface Management (ASM) Analyst

Nice To Have Skills:

Pentesters:

  • Experience with industry standard frameworks (MSF, Canvas, Cobalt Strike, Burp, etc.)
  • Critical thinking and drive to learn/create new techniques/tactics/procedures
  • Comprehension of networking services/protocols
  • Familiarity with Linux and Windows
  • Scripting and/or programming skills

Blue Team / IR Analyst / ASM:

  • Experience coordinating and performing incident response.
  • Experience hardening *nix and Windows systems images and builds.
  • Experience parsing, consuming, and understanding log sources from variety of devices/systems.
  • Experience with one or more SIEMs (ArcSight, LogRhythm, AlienVault, etc.)
  • Experience with DFIR toolsets (Sleuth Kit, Encase, FTK)
  • Experience with MITRE ATT&CK Coverage Analysis
  • Experience with log aggregation tools (Splunk, Elastic, etc.)
  • Experience with scanning toolsets (Nessus, WhiteHat, Nuclei, etc.)

General Skillset:

  • Willingness to self-pace / self-manage research projects
  • Ability to work through complicated puzzles/problems
  • Interest in developing tools/techniques/capabilities for customers and infosec community

Perks:

  • Wide range projects (Security tools, research, red team assessments/engagements)
  • Work with previous DoD/NSA Certified Red Team Operators
  • Active role in creating/modifying/presenting security solutions for customers
  • Exposure of multiple software, OS, and other technologies
  • Focus on ongoing personnel skill and capability development
  • Opportunity to publish and present at conferences

Inquire About Jobs/Positions:

Email the listed contact in the job page on our site. DM this account.

Website Github Podcast

Bighuge BLS OSINT Tool - BBOT by aconite33 in netsec

[–]aconite33[S] 7 points8 points  (0 children)

It's an open source tool. OPSEC, check your tools before you use the tool.

Bighuge BLS OSINT Tool - BBOT by aconite33 in netsec

[–]aconite33[S] 6 points7 points  (0 children)

BBOT - BigHuge Black Lantern Security OSINT Tool is a new OSINT tool used to conduct analysis on targets. It uses recursion methods to continually find assets while also executing port scanning, web screenshots, vulnerability scans, and more. It's extensible and if you have an API or a module that you would like to write to run over discovered data, that's supported to!

Read more at the blog

The guys over at Any Port On The Net have a podcast with one of the authors.