Hacking Diversity
Marcelle Lee
#whoami
www.hackerhalted.com 2@marcellelee
security researcher
educator
CTF enthusiast
packet nerd and forensicator
CISSP | CEH | CSX-P | GCIA | GCFA | GCIH | GPEN | GSEC |
GCCC | GISF | CCNA | PenTest+ | Sec+ | Net+ | ACE
#definition
www.hackerhalted.com 3@marcellelee
RFC 1392 Internet Users' Glossary, 1993
#definition
www.hackerhalted.com 4
Merriam Webster
@marcellelee
#the problem
www.hackerhalted.com 5@marcellelee
#the problem
www.hackerhalted.com 6@marcellelee
#the problem
www.hackerhalted.com 7@marcellelee
● 3.5 million cybersecurity job openings by 2021
● 74% of orgs are facing a cybersecurity skills shortage
● Cybercrime is predicted to cost the world $6 trillion
annually by 2021
● 60% of small businesses go out of business six months
after a cyber attack.
indeed.com search for cybersecurity,
October 2019
www.hackerhalted.com 8@marcellelee
We are beyond a village.
It’s going to take an army.
#stats
www.hackerhalted.com 9@marcellelee
#stats
www.hackerhalted.com 10
ISC2
@marcellelee
● North America leads the world in female participation
rates in cybersecurity at 14%.
● 51% of women in cybersecurity have experienced
discrimination.
● 87% of that discrimination was associated with
unconscious bias.
● People of color represent only about 12% of
information security analysts.
www.hackerhalted.com 11@marcellelee
Unconscious bias impacts
hiring decisions.
#stereotypes
www.hackerhalted.com 12@marcellelee
#stereotypes
www.hackerhalted.com 13@marcellelee
#legalities
www.hackerhalted.com 14
Protected classes:
• Race
• Religion
• National origin
• Gender
• Age (40 and over)
• Pregnancy
• Familial status (having children)
• Disability status
• Veteran status
• Genetic information
@marcellelee
www.hackerhalted.com 15@marcellelee
We are hackers.
We can figure this out.
#benefits of diversity
www.hackerhalted.com 16@marcellelee
When companies commit themselves to diverse leadership, they are
more successful. More diverse companies, we believe, are better
able to win top talent and improve their customer orientation,
employee satisfaction, and decision making, and all that leads to a
virtuous cycle of increasing returns. This in turn suggests that other
kinds of diversity—for example, in age, sexual orientation, and
experience (such as a global mind-set and cultural fluency)—are also
likely to bring some level of competitive advantage for companies
that can attract and retain such diverse talent.
McKinsey & Company
#benefits of diversity
www.hackerhalted.com 17@marcellelee
Forbes
#benefits of diversity
www.hackerhalted.com 18@marcellelee
TechRepublic
#benefits of diversity
www.hackerhalted.com 19@marcellelee
Want to know how to build more
diverse teams?
www.hackerhalted.com 20@marcellelee
Hold my beer Babe Grigio
and watch this!
#solutions
www.hackerhalted.com 21@marcellelee
Change how you write your job postings:
● Avoid terms like “rockstar” and “ninja”.
● Set reasonable expectations for what is required for the job
and don’t ask for more.
● State that training and professional growth are supported
(and then actually support).
● Avoid listing gender-oriented perks (foosball anyone?)
#solutions
www.hackerhalted.com 22@marcellelee
Responsibilities:
Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in network and on host.
Find evidence of attack, and attackers actions thereafter.
Work with team to produce effective countermeasures against found evidence. Also, contributes to mitigations for future attacks of a similar nature.
Follow Security Operations Center (SOC) policies, procedures for incident reporting and management. Create a detailed Incident Report (IR) and contribute
to lessons learned. .
Analyze infrastructure build sheets, Configuration Management Database (CMDB), NIST 800-53 ATO artifacts, Vulnerability scans, Access Control Lists
(ACL), and vendor documentation to thoroughly understand software behaviors and interactions. .
Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.
Study and understand IANA, W3C, IETF and other internet bodies’ protocol RFC definitions to understand violations and security weaknesses.
Conduct forensic testing and operational hardening of multiple OS platforms.
Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive
posture.
Work with SOC shift team to help contain intrusions.
...
Desired Experience:
Thorough understanding of network protocol behaviors. Ability to understand netflow and PCAP.
Thorough knowledge of open source tools to visualize PCAP data (Wireshark, TCPDump, etc.).
Detailed knowledge of various forms of social engineering, including the ability to recognize and handle spear-phishing campaigns or other forms of social
engineering attacks.
Comprehensive knowledge of Windows and Linux behaviors, logging, vulnerabilities, exploits, and known attacks.
Use of IPSec packet filtering and Windows firewalls with specific application to defense in depth of network based attacks, data corruption, data theft,
credential theft, and administrative control.
Red Team/Blue Team experience from a federal agency
Actual job posting. But wait, there’s more...
#solutions
www.hackerhalted.com 23@marcellelee
Required Skills:
Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as
well as superior knowledge of technical operations process and procedures
Knowledge of how encryption, key management and cryptology works in the enterprise and in cyber data
Understanding of Enterprise Architecture Standards such as the Department of Defense Architecture Framework (DODAF), Service-Oriented Architecture
(SOA), the Open Group Architecture Framework (TOGAF), and/or the Amazon Web Services (AWS) Well Architected Framework
Knowledge in the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security
Modernization Act (FISMA) operating standards and applicable guidelines (risk profiling, control selection, control assessment, control monitoring)
Expertise in performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation
Expertise in Application Penetration Testing (fuzzing, reverse engineering, Fortify or similar, IDA Pro, Kali, BackTrack, OllyDbg, SQLMap, etc.)
Expertise in Proof of Concept (Exploit) development
Understanding of Secure SDLC (threat modelling, security requirements, secure design, secure implementation, secure testing, secure maintenance)
Knowledge of Mobile Application Security and MDM sensor data
Expertise in Embedded Device Security
Expertise in Malware Analysis
Expertise in a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Powershell, Python,
BASH) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as
ASP.NET, J2EE
Organizational Skills: Proven ability to plan and prioritize work, both their own and that of team. Follows tasks to their logical conclusion.
Problem Solving: Natural inclination for planning strategy and tactics. Ability to analyze problems and determine root cause, generating alternatives, evaluating
and selecting alternatives and implementing solutions.
Results oriented: Able to drive things forward regardless of personal interest in the task.
Education Requirements:
Minimum of 8 years of experience and a Masters, 10 years of experience with a Bachelor’s, or 12 years of experience with an Associate’s Degree
This job description could change at any time, without notice.
#solutions
www.hackerhalted.com 24@marcellelee
Review the “face” of your
organization:
● Is diversity depicted in external
materials?
● Are your recruiting efforts geared
to various audiences?
● Do you provide conference swag
that appeals to a diverse group?
#solutions
www.hackerhalted.com 25@marcellelee
Is your company culture
universally appealing?
We take our work and our fun seriously. We
refuse any work that isn’t hard and engaging.
We make sure our engineers have the tools
they need to do their jobs, and focus on
recognizing results. Surfboards, pirate flags,
and DEFCON black badges decorate our
offices, and our Nerf collection dwarfs that
of most toy stores
Would you like to work at an office that
celebrates International Tabletop Day,
May the 4th Be With You, and Alan
Turing’s birthday? A place that built
their conference room table from
Legos? An office that regularly breaks
out in Nerf Wars? Do you want to work
for a CEO that drives a DeLorean?
Actual job postings.
#solutions
www.hackerhalted.com 26@marcellelee
Do your benefits appeal to a broad audience?
● Paid maternity/paternity leave.
● Flexible work hours.
● Gender reassignment assistance.
● Domestic partner benefits.
● Student loan debt assistance.
● Accessible facilities.
#solutions
www.hackerhalted.com 27@marcellelee
Treat candidates like the valuable assets they are:
● Be respectful of candidates’ time.
● Provide a salary range for the position.
● Respond promptly to questions.
● Don’t sugarcoat realities of the position.
A Glassdoor study found that 82% of candidates felt that the interview
process should take no more than a month.
#solutions
www.hackerhalted.com 28@marcellelee
Address the impact of unconscious bias in your hiring process.
● Create a diverse team to conduct interviews and rotate the
members.
● Have a consistent and repeatable interview process.
● Educate your hiring managers and interviewers.
● Use blind hiring processes.
#solutions
www.hackerhalted.com 29@marcellelee
#solutions
www.hackerhalted.com 30@marcellelee
Support organizations that promote the interests of
diverse populations:
● Women’s Society of Cyberjutsu
● Out & Equal
● Hire Our Heroes
● Women Who Code
● Lesbians Who Tech
● International Consortium Of Minority Cybersecurity
Professionals
To name a few...
www.hackerhalted.com 31@marcellelee
Who is on your team?
www.hackerhalted.com 32
marcellelee.github.io
medium.com/@marcellelee
linkedin.com/in/marcellelee
twitter.com/marcellelee
@marcellelee

More Related Content

PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PPTX
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
PPTX
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
PDF
OSINT Basics for Threat Hunters and Practitioners
PPTX
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
PPTX
Jason Samide - State of Security & 2016 Predictions
PDF
From OSINT to Phishing presentation
PDF
Zero-Knowledge Proofs: Identity Proofing and Authentication
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
OSINT Basics for Threat Hunters and Practitioners
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Jason Samide - State of Security & 2016 Predictions
From OSINT to Phishing presentation
Zero-Knowledge Proofs: Identity Proofing and Authentication

What's hot (20)

PDF
Osint presentation nov 2019
PDF
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
PPTX
Berkarir di Cyber Security
PDF
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PDF
Opsec for security researchers
PDF
Click and Dragger: Denial and Deception on Android mobile
PPTX
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
PDF
Zero-Knowledge Proofs in Light of Digital Identity
PPTX
The Cybercriminal Underground: Understanding and categorising criminal market...
PPT
Owasp osint presentation - by adam nurudini
PDF
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
PPTX
OSINT mindset to protect your organization - Null monthly meet version
PPTX
Python-Assisted Red-Teaming Operation
PPTX
osint - open source Intelligence
PPTX
The Cybercriminal Underground: Understanding and categorising criminal market...
PPTX
Osint - Dark side of Internet
PPTX
GreyNoise - Lowering Signal To Noise
PPTX
PDF
Analogic Opsec 101
PDF
Does a Bear Leak in the Woods?
Osint presentation nov 2019
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Berkarir di Cyber Security
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Opsec for security researchers
Click and Dragger: Denial and Deception on Android mobile
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Zero-Knowledge Proofs in Light of Digital Identity
The Cybercriminal Underground: Understanding and categorising criminal market...
Owasp osint presentation - by adam nurudini
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
OSINT mindset to protect your organization - Null monthly meet version
Python-Assisted Red-Teaming Operation
osint - open source Intelligence
The Cybercriminal Underground: Understanding and categorising criminal market...
Osint - Dark side of Internet
GreyNoise - Lowering Signal To Noise
Analogic Opsec 101
Does a Bear Leak in the Woods?

Similar to Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee (20)

PPTX
Should i study cyber security
PPTX
Career options in Artificial Intelligence : 2020
DOC
Top IT skills in very high demand in 2025.doc
PDF
Fru 2022 | Tech Trends, Themes, Thoughts, Perspectives and Predictions
PDF
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
PPTX
Patternbuilders Founder Showcase Deck
PDF
Introduction to Cybersecurity | IIT(BHU)CyberSec
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
PDF
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
PDF
Salesforce Architect Group, Frederick, United States July 2023 - Generative A...
PDF
Classroom to careers in Web Development
PDF
Future of Work and AI - Digital Disruption in the Workplace
PDF
Technology Trends and a Digital Revolution - Alexandre Blauth
PDF
How To Become A Blockchain Engineer
PDF
Understanding the New World of Cognitive Computing
PPTX
How I Learned to Stop Worrying and Love Building Data Products
PDF
Building an enterprise security knowledge graph to fuel better decisions, fas...
PPT
Using Product Box to Build the Complete Developer
PDF
Phx-techtalk
PDF
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Should i study cyber security
Career options in Artificial Intelligence : 2020
Top IT skills in very high demand in 2025.doc
Fru 2022 | Tech Trends, Themes, Thoughts, Perspectives and Predictions
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
Patternbuilders Founder Showcase Deck
Introduction to Cybersecurity | IIT(BHU)CyberSec
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Salesforce Architect Group, Frederick, United States July 2023 - Generative A...
Classroom to careers in Web Development
Future of Work and AI - Digital Disruption in the Workplace
Technology Trends and a Digital Revolution - Alexandre Blauth
How To Become A Blockchain Engineer
Understanding the New World of Cognitive Computing
How I Learned to Stop Worrying and Love Building Data Products
Building an enterprise security knowledge graph to fuel better decisions, fas...
Using Product Box to Build the Complete Developer
Phx-techtalk
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!

More from EC-Council (20)

PPTX
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
PDF
Cloud Security Architecture - a different approach
PPTX
Phases of Incident Response
PDF
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PDF
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
PDF
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
PDF
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
PDF
War Game: Ransomware – Global CISO Forum 2019
PPTX
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PPTX
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
PPTX
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
PPTX
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
PPTX
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
PPTX
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
PPTX
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
PPTX
Global CCISO Forum 2018 | Sharon Smith "Don't Panic"
PPTX
Global CCISO Forum 2018 | AI vs Malware 2018
PPTX
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
Cloud Security Architecture - a different approach
Phases of Incident Response
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
War Game: Ransomware – Global CISO Forum 2019
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | Sharon Smith "Don't Panic"
Global CCISO Forum 2018 | AI vs Malware 2018
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...

Recently uploaded (20)

PDF
Five Habits of High-Impact Board Members
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
The various Industrial Revolutions .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
STKI Israel Market Study 2025 version august
PPT
Geologic Time for studying geology for geologist
DOCX
search engine optimization ppt fir known well about this
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hybrid model detection and classification of lung cancer
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Architecture types and enterprise applications.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
Five Habits of High-Impact Board Members
sustainability-14-14877-v2.pddhzftheheeeee
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Chapter 5: Probability Theory and Statistics
Taming the Chaos: How to Turn Unstructured Data into Decisions
The various Industrial Revolutions .pptx
Module 1.ppt Iot fundamentals and Architecture
Developing a website for English-speaking practice to English as a foreign la...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
STKI Israel Market Study 2025 version august
Geologic Time for studying geology for geologist
search engine optimization ppt fir known well about this
DP Operators-handbook-extract for the Mautical Institute
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hybrid model detection and classification of lung cancer
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Architecture types and enterprise applications.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A contest of sentiment analysis: k-nearest neighbor versus neural network

Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee

  • 2. #whoami www.hackerhalted.com 2@marcellelee security researcher educator CTF enthusiast packet nerd and forensicator CISSP | CEH | CSX-P | GCIA | GCFA | GCIH | GPEN | GSEC | GCCC | GISF | CCNA | PenTest+ | Sec+ | Net+ | ACE
  • 7. #the problem www.hackerhalted.com 7@marcellelee ● 3.5 million cybersecurity job openings by 2021 ● 74% of orgs are facing a cybersecurity skills shortage ● Cybercrime is predicted to cost the world $6 trillion annually by 2021 ● 60% of small businesses go out of business six months after a cyber attack. indeed.com search for cybersecurity, October 2019
  • 8. www.hackerhalted.com 8@marcellelee We are beyond a village. It’s going to take an army.
  • 10. #stats www.hackerhalted.com 10 ISC2 @marcellelee ● North America leads the world in female participation rates in cybersecurity at 14%. ● 51% of women in cybersecurity have experienced discrimination. ● 87% of that discrimination was associated with unconscious bias. ● People of color represent only about 12% of information security analysts.
  • 14. #legalities www.hackerhalted.com 14 Protected classes: • Race • Religion • National origin • Gender • Age (40 and over) • Pregnancy • Familial status (having children) • Disability status • Veteran status • Genetic information @marcellelee
  • 15. www.hackerhalted.com 15@marcellelee We are hackers. We can figure this out.
  • 16. #benefits of diversity www.hackerhalted.com 16@marcellelee When companies commit themselves to diverse leadership, they are more successful. More diverse companies, we believe, are better able to win top talent and improve their customer orientation, employee satisfaction, and decision making, and all that leads to a virtuous cycle of increasing returns. This in turn suggests that other kinds of diversity—for example, in age, sexual orientation, and experience (such as a global mind-set and cultural fluency)—are also likely to bring some level of competitive advantage for companies that can attract and retain such diverse talent. McKinsey & Company
  • 18. #benefits of diversity www.hackerhalted.com 18@marcellelee TechRepublic
  • 19. #benefits of diversity www.hackerhalted.com 19@marcellelee Want to know how to build more diverse teams?
  • 20. www.hackerhalted.com 20@marcellelee Hold my beer Babe Grigio and watch this!
  • 21. #solutions www.hackerhalted.com 21@marcellelee Change how you write your job postings: ● Avoid terms like “rockstar” and “ninja”. ● Set reasonable expectations for what is required for the job and don’t ask for more. ● State that training and professional growth are supported (and then actually support). ● Avoid listing gender-oriented perks (foosball anyone?)
  • 22. #solutions www.hackerhalted.com 22@marcellelee Responsibilities: Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in network and on host. Find evidence of attack, and attackers actions thereafter. Work with team to produce effective countermeasures against found evidence. Also, contributes to mitigations for future attacks of a similar nature. Follow Security Operations Center (SOC) policies, procedures for incident reporting and management. Create a detailed Incident Report (IR) and contribute to lessons learned. . Analyze infrastructure build sheets, Configuration Management Database (CMDB), NIST 800-53 ATO artifacts, Vulnerability scans, Access Control Lists (ACL), and vendor documentation to thoroughly understand software behaviors and interactions. . Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs. Study and understand IANA, W3C, IETF and other internet bodies’ protocol RFC definitions to understand violations and security weaknesses. Conduct forensic testing and operational hardening of multiple OS platforms. Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture. Work with SOC shift team to help contain intrusions. ... Desired Experience: Thorough understanding of network protocol behaviors. Ability to understand netflow and PCAP. Thorough knowledge of open source tools to visualize PCAP data (Wireshark, TCPDump, etc.). Detailed knowledge of various forms of social engineering, including the ability to recognize and handle spear-phishing campaigns or other forms of social engineering attacks. Comprehensive knowledge of Windows and Linux behaviors, logging, vulnerabilities, exploits, and known attacks. Use of IPSec packet filtering and Windows firewalls with specific application to defense in depth of network based attacks, data corruption, data theft, credential theft, and administrative control. Red Team/Blue Team experience from a federal agency Actual job posting. But wait, there’s more...
  • 23. #solutions www.hackerhalted.com 23@marcellelee Required Skills: Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS) Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures Knowledge of how encryption, key management and cryptology works in the enterprise and in cyber data Understanding of Enterprise Architecture Standards such as the Department of Defense Architecture Framework (DODAF), Service-Oriented Architecture (SOA), the Open Group Architecture Framework (TOGAF), and/or the Amazon Web Services (AWS) Well Architected Framework Knowledge in the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines (risk profiling, control selection, control assessment, control monitoring) Expertise in performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation Expertise in Application Penetration Testing (fuzzing, reverse engineering, Fortify or similar, IDA Pro, Kali, BackTrack, OllyDbg, SQLMap, etc.) Expertise in Proof of Concept (Exploit) development Understanding of Secure SDLC (threat modelling, security requirements, secure design, secure implementation, secure testing, secure maintenance) Knowledge of Mobile Application Security and MDM sensor data Expertise in Embedded Device Security Expertise in Malware Analysis Expertise in a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Powershell, Python, BASH) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET, J2EE Organizational Skills: Proven ability to plan and prioritize work, both their own and that of team. Follows tasks to their logical conclusion. Problem Solving: Natural inclination for planning strategy and tactics. Ability to analyze problems and determine root cause, generating alternatives, evaluating and selecting alternatives and implementing solutions. Results oriented: Able to drive things forward regardless of personal interest in the task. Education Requirements: Minimum of 8 years of experience and a Masters, 10 years of experience with a Bachelor’s, or 12 years of experience with an Associate’s Degree This job description could change at any time, without notice.
  • 24. #solutions www.hackerhalted.com 24@marcellelee Review the “face” of your organization: ● Is diversity depicted in external materials? ● Are your recruiting efforts geared to various audiences? ● Do you provide conference swag that appeals to a diverse group?
  • 25. #solutions www.hackerhalted.com 25@marcellelee Is your company culture universally appealing? We take our work and our fun seriously. We refuse any work that isn’t hard and engaging. We make sure our engineers have the tools they need to do their jobs, and focus on recognizing results. Surfboards, pirate flags, and DEFCON black badges decorate our offices, and our Nerf collection dwarfs that of most toy stores Would you like to work at an office that celebrates International Tabletop Day, May the 4th Be With You, and Alan Turing’s birthday? A place that built their conference room table from Legos? An office that regularly breaks out in Nerf Wars? Do you want to work for a CEO that drives a DeLorean? Actual job postings.
  • 26. #solutions www.hackerhalted.com 26@marcellelee Do your benefits appeal to a broad audience? ● Paid maternity/paternity leave. ● Flexible work hours. ● Gender reassignment assistance. ● Domestic partner benefits. ● Student loan debt assistance. ● Accessible facilities.
  • 27. #solutions www.hackerhalted.com 27@marcellelee Treat candidates like the valuable assets they are: ● Be respectful of candidates’ time. ● Provide a salary range for the position. ● Respond promptly to questions. ● Don’t sugarcoat realities of the position. A Glassdoor study found that 82% of candidates felt that the interview process should take no more than a month.
  • 28. #solutions www.hackerhalted.com 28@marcellelee Address the impact of unconscious bias in your hiring process. ● Create a diverse team to conduct interviews and rotate the members. ● Have a consistent and repeatable interview process. ● Educate your hiring managers and interviewers. ● Use blind hiring processes.
  • 30. #solutions www.hackerhalted.com 30@marcellelee Support organizations that promote the interests of diverse populations: ● Women’s Society of Cyberjutsu ● Out & Equal ● Hire Our Heroes ● Women Who Code ● Lesbians Who Tech ● International Consortium Of Minority Cybersecurity Professionals To name a few...