Comments
Flash Poll: The Hunt For Cyber Talent
Newest First  |  Oldest First  |  Threaded View
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
6/4/2014 | 5:18:32 PM
Re: Don't Forget Instinct
@Marilyn Cohodas

I can't speak to success rate since I wasn't involved in ever newhire, but I can say a flag or two was captured!  Yes, I think it is a solid approach.  I truly believe in challenging candidates for tanglible, demonstrable abilities.

 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/2/2014 | 5:02:11 PM
Re: Don't Forget Instinct
Good strategy, Christrian. what's you success rate when you make candidates capture the flag? Do they? 
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
6/2/2014 | 4:01:56 PM
Re: Don't Forget Instinct
@Marilyn Cohodas - Disclaimer:  I'm not a hiring manager, but I have particiapted in the interview process. 

For me, I put the resume aside and I get right to the point.  Start off the bat with a question that pushes the candidate into action.  Tell them your company's datacenter architecture, how many servers, the OS ecosystems, applications and network, and maybe one or two known weaknesses.  Now, the questions: "How do you penetrate our network and take root for at least one system in our datacenter?" or "How do you bring our datacenter services down such that our clients no longer have functional connectivity?" and "What recommendations would you have toward buttoning up our security?"  How they answer that will tell you at least if they are 1) experienced in doing that type of thing, and 2) knowledgable beyond books and research.  In fact, you really don't want someone (like me, for instance) who is widely read, but has never actually done the work.  

The follow-up to this is actually putting the candidate down in front of a system with a decent toolset pre-installed, from penetration tools to interpreters (Ruby, Python, etc) and give them a flag to capture.  Seriously - because I think that time is money in today's tech environment, and if you can't do what you say you can do, and do it efficiently and with intelligence, and demonstrate a knack for the work, as well as a passion for all the work entails, then why are you applying for the job? 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/1/2014 | 6:30:46 PM
Re: Don't Forget Instinct
That's an intersesting filter rule for hiring cyber talent, Christian. How do you know someone has the "killer instinct" that you speak of? Is it a gut check on your part or are there quesitons you ask or "tells" that you observe.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/1/2014 | 6:27:06 PM
Re: ROI
Ryan,

That makes perfect sense but I'm curious to hear some examples of exactly this would work. Can you describe some of the metrics that you follow and how they are interpreted? 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/30/2014 | 10:22:32 PM
ROI
I also think as security professionals, though it may be hard to correlate to precise dollars and cents, we need to show how are value is ten times that of our expense. I know it may have a negative connotation, but many enterprises put huge emphasis on budget. Its a reality that needs to be acknowledged for a business to stay successful.

Not all, but many people are aware of the security risks involved in data security. Between Utilities, Finance, Healthcare, and retail the past breaches represent a tangible threat that is now in the faces of most executives. It cannot be ignored.

What makes it easier to get executives of the business to get behind hiring a solid security team, can be to display a return on investment. I know from a healthcare background that one spreadsheet of lost PHI can cost thousands to hundreds of thousands. By providing appropriate metrics for each respectable business type in accordance with the regulations and standards mandated by that business type, you can show that its not only a prudent idea to have a capable security team, but financially responsible.
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
5/30/2014 | 7:00:34 PM
Don't Forget Instinct
I think one of the areas companies searching for security professionals are lax in is gauging the instinct factor.  Depending on why you are hiring the resource, there are varying levels of "killer" instinct needed for someone to be a successful security professional.  It's like any other hacking career path, whether it be security, architecture, coding, testing - each area requires a certain panache and natural instinct. 

I commented on another story about fear being a factor in not hiring a certain class of hacker/cracker, those with criminal records.  I think this is a similar thing.  You really want someone who has that killer instinct and can come in and rip your network environment to shreds quickly, then turn around and show you how they did it, and what you need to do to prevent someone else from doing it.  Do you want a monitor-watcher or a proactive resource that can save your business from nefarious assaults?  Getting past the fear of whether you can trust that person is a real dilemma, true.  It must be dealt with quickly, however.

Of course, every business has different needs, based upon size, budget and sensitivity of data.  But again, never let the review of a candidate's instinct get passed over.  It could make the difference between having a reputation for being a secure business, or reading about being an insecure business in an exploit.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/30/2014 | 1:49:13 PM
Re: Security Talent Pool Small
It's a great place for you to be Randy. I totally agree. 
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/30/2014 | 12:59:56 PM
Security Talent Pool Small
It is true the talent pool is small but many times the ones in the pool have spent years in the trade honing their skills to a marketable level. So while the skill level is shallow, it is often quality and not quantity that is represented in the pool. If the demand for security practitioners continues to grow so will the level of skill that is required to stay marketable. As one of the ones in the shallow pool, I say this is not a bad place to be.


Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.