TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How to be an independent security consultant?

17 pointsby notastartupover 10 years ago
So I&#x27;ve been wanting to switch from software development into pen testing and security consulting. I want to get some practical skillset enough to consult local tech companies. In general, need some materials which I can follow and learn as well as some guidance.<p>To become a software developer the path is pretty clear, you learn the language, build some stuff on your own, and take on real world projects. I find that this is a bit of a different path.

1 comment

tptacekover 10 years ago
Going from zero to independent consultant in appsec is going to be difficult. There&#x27;s a lot of work that needs to be done, more than all the serious firms can handle, but every good project has multiple bidders. For any project you&#x27;d actually want to work on, you&#x27;re not going to be competitive as a fledgeling indie consultant going up against Accuvant, NCC, IOA, and Leviathan.<p>My advice is, take a job with a consulting firm to learn the ropes. Then decide whether you want to sink several years of your life getting a new consultancy off the ground. I didn&#x27;t reliably match my FT salary after starting Matasano for several years.<p>In any case, if you&#x27;re looking for things you can do to make yourself marketable as a security consultant:<p>* (Easiest, but least-bang-for-buck): file bugs, particularly for companies with bug bounties that will credit you. Don&#x27;t look for bugs in companies that don&#x27;t offer public permission to test, though.<p>* Go looking for a vulnerability in a framework, programming language, or major library. By the time you find one, you&#x27;ll have expertise in that technology, which you can (a) add to your bio and (b) use as lead-gen for work.<p>* Find a pattern of vulnerabilities. If those vulnerabilities aren&#x27;t novel, design some countermeasure that fixes them all. If they are novel, you can stop there. Now put together a talk and submit at security conferences. In rough order of prestige, and certainly having left several out: Black Hat USA, CanSec, CCC, Black Hat Anywhere But USA, DefCon, Recon, Toorcon, RSA, Derbycon, OWASP.
评论 #8661064 未加载