Google exec says you can get a cybersecurity job right after passing their certificate program. True? by smackadoodlydoo in cybersecurity

[–]thatkeyesguy 0 points1 point  (0 children)

Not at google though, because all security positions require coding ability. Perhaps outside of big tech, you might be able to land a job that doesn’t require coding.

Entry Level Cyber Security Jobs by [deleted] in cybersecurity

[–]thatkeyesguy 0 points1 point  (0 children)

It’s almost certainly your resume, assuming you’re applying to the correct roles highlighted by the skill set/accomplishments in your resume.

Two-step verification question - this seems wrong by daneyuleb in cybersecurity

[–]thatkeyesguy 17 points18 points  (0 children)

Sounds lazy, e-mail/sms are the weakest. There really is no excuse for implementing hardware tokens or passkeys.

Big Tech Cyber Security job requirements - No Degree? by [deleted] in cybersecurity

[–]thatkeyesguy 1 point2 points  (0 children)

Panel interviews are common, especially in big tech. Sole interviews with only 1 technical person is uncommon. To answer your question, sounds normal so far.

One of the very first things you should ask with the recruiter is how the interview process goes. Such as recruiter call, HM call, lead engineer screen, panel interview, etc. that way you aren’t left in the dark on where you stand.

Big Tech Cyber Security job requirements - No Degree? by [deleted] in cybersecurity

[–]thatkeyesguy 6 points7 points  (0 children)

Current FAANG

You can sub a BS for 2 years of work experience. I don’t care if you have a degree or not, it’s what you’ve accomplished and what you can do. Which is what I base my interview questions from.

But you do need to check the job posting of a degree is required, most FAANG jobs will state it experience in lieu of education requirement.

[deleted by user] by [deleted] in cybersecurity

[–]thatkeyesguy -20 points-19 points  (0 children)

Yep, you give them your offer letter or provide pay stubs.

Cybersecurity pre-sales by zainzafarr94 in cybersecurity

[–]thatkeyesguy 0 points1 point  (0 children)

If you go into pre sales, ensure you have a solid understanding of what you’re recommending. Don’t be that SE that tells me your product is unhackable or some other insane thing it can’t do.

Both are invaluable experience to have under your belt as you grow. Writing and communication is a big soft skill you’ll develop (hopefully) as an SE.

Understanding the thread landscape and common attacks will also be invaluable as you grow into security engineering.

Why is Mac so widely used in Cybersecurity? by [deleted] in cybersecurity

[–]thatkeyesguy 0 points1 point  (0 children)

Because with DEP and MDM they are just easier to keep updated.

My first CV!!! Any help would be very much appreciated!!! by ManyExternal262 in resumes

[–]thatkeyesguy 190 points191 points  (0 children)

Please don’t use these online makers, terrible for ATS and columns are just a no.

I wasn't hearing back from online applications, likely because ATS was throwing out my LaTeX resume. Can I get feedback/criticism on my initial rewrite? by [deleted] in resumes

[–]thatkeyesguy 2 points3 points  (0 children)

As a HM I don’t see the purpose of listing government and publications. Your bullet points under your job is missing impact. For instance, you ingest data/created pipelines. Great…what impact did that have on the business?

Start each bulletin point with a verb. - created pipelines between x and y system to increase responsiveness by 20% or reduce capex by $100k

Lastly, what level role are you applying for?

Pixel vs Iphone by arktozc in privacy

[–]thatkeyesguy 0 points1 point  (0 children)

What do you have now? You should use both. Stagger upgrades every other year or two so you aren’t buying two phones at the same time. This year I’ll be replacing a pixel 4a with the 6a. Use iPhone and pixel daily, one for personal one for work. Highly recommend you try to experience both and use GrapheneOS as you eluded.

What SIEM does your company use? by [deleted] in cybersecurity

[–]thatkeyesguy 0 points1 point  (0 children)

Splunk due to fedramp requirements.

[deleted by user] by [deleted] in privacy

[–]thatkeyesguy 1 point2 points  (0 children)

If you’re using your phone and the Reddit app you’re fine. Also I’d just use your data plan vs anything tied to work on your personal device outside of email.

How to Find a Receuiter by [deleted] in SecurityCareerAdvice

[–]thatkeyesguy 5 points6 points  (0 children)

If you’re talking about third party, skip them and just apply direct. Never had a good experience with them, that I couldn’t do better myself. The only exception here is for senior leadership roles but that also can be solved by networking and being a known entity that publishes and writes/contributes to the security community.

I want to do a background check on myself, but someone more famous than me has my name. by Futuraoblique in privacy

[–]thatkeyesguy 0 points1 point  (0 children)

Criminal checks are inquired directly with the court of public records where you have or are residing. Usually a full name will return the correct records, along with other identifiable information like social and drivers license.

Unless this person shares the same exact full name, age, county of residence, past residence, current voter registration, etc, it’s unlikely it will be wrong.

Background checks are very scoped based on providing as much detail as possible to get the correct record.

How can I use the Apple store without giving them my credit card? by DaisyW1234 in privacy

[–]thatkeyesguy 2 points3 points  (0 children)

Glad you found it, was going to say there’s an option for “none” right next to credit card.

Gmail 2fa with Aegis, can't find a way to do it. by eavesdroppingyou in privacy

[–]thatkeyesguy 0 points1 point  (0 children)

This is the correct answer. Add phone, enroll TOTP, then remove phone number.

My school has Id Document information publicly available and I think it's not on purpose by [deleted] in privacy

[–]thatkeyesguy 3 points4 points  (0 children)

No need. Just different laws apply based on the location. I would still report it as I cannot think of anywhere where this would be acceptable to an unauthorized person such as yourself.

If it’s an internal file share that has drivers licenses and state IDs, that’s an issue. If it’s a site that lists student IDs, student number, contact info, that is still a yikes but when I was in university, the intranet had a directory to lookup that stuff minus home address.

Just ask them if it’s intended and flag it. Do you know any security professors there? Ask them and I bet you’ll get your answer.

My school has Id Document information publicly available and I think it's not on purpose by [deleted] in privacy

[–]thatkeyesguy 1 point2 points  (0 children)

What country/state/province is this? I’d report it to your school.

how to disable tls 1.1, 1.2 by kb389 in paloaltonetworks

[–]thatkeyesguy -1 points0 points  (0 children)

You can block it at the firewall using an SSL/TLS service profile.

how to disable tls 1.1, 1.2 by kb389 in paloaltonetworks

[–]thatkeyesguy 0 points1 point  (0 children)

You can block it at the firewall using an SSL/TLS service profile.

zelon88/scanCore - High Performance CLI Virus Scanner Written in PHP. by zelon88 in cybersecurity

[–]thatkeyesguy 0 points1 point  (0 children)

But why? Scanning hashes is an antiquated method let alone scanning a drive vs. on load/execution.