TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Transitioning from game development to cybersecurity. Tips or advice?

43 点作者 poutinepapi超过 1 年前
Hello HN!<p>I was let go from my gaming job a couple of months ago, and unfortunately nothing has come up yet.<p>Thankfully, I was thinking of moving away from the industry anyway, so this is a great opportunity to do so. I&#x27;ve got some savings and have given myself a year to set-up a cybersecurity consultancy business. My main target will be start-ups, and small to medium tech companies, particularly gaming ones that don&#x27;t yet have a cybersecurity division, but nonetheless need one, and don&#x27;t see the point of hiring a full time cybersecurity professional.<p>The field has always interested me, and most of my games experience is doing server side development, alongside DevOps, and then straight game dev. But server work has been the bulk, so at least I&#x27;m familiar with the basics of hardening a system against interference, mostly by players trying to cheat, and every now and again against criminal interests who have targeted our games.<p>I&#x27;ve got around 15+ years of experience as a software engineer, around half of that in plain server development, and the other half specialized in server dev for games.<p>I&#x27;ve got a bachelor&#x27;s degree in software engineering, and an MSc in Computer Games Technology. I&#x27;m taking a short postgrad course in Cybersecurity at my local university, but that takes 8 months. In the meantime, I&#x27;m studying to get Security+ certified so I can start bidding for jobs and have something more backing me apart from my CV.<p>My question is the following, what am I missing? What else can I get or do to give myself more credibility? Does anyone have any tips on getting clients?<p>I&#x27;m planning on running promotions for start-ups and going to several meet-ups to distribute coupons, some booklets with free information on personal cybersecurity, and just to network.<p>Cheers in advance for the advice!<p>p.s.: I&#x27;m also setting a sister company for game dev consulting, but I&#x27;m much more familiar with that and feel much more comfortable with it, but tips for that are also welcome.

7 条评论

ipython超过 1 年前
Some thoughts from someone who has been in the security biz for a while:<p>1. Security is more a mindset than anything else. Get used to finding the edge cases. Think &quot;how can I break this...&quot; or &quot;how can I get around this restriction...&quot; Many security folks I know started actually by exactly what you mentioned- figuring out how to bypass copy protection on games, how to bypass client-side checks in multi-player games, ... and so on.<p>2. Many pure security folks are very poor developers. You&#x27;ll have a unique skillset here if you can apply it. Most security oriented folks use Python for quick scripts. If you already know python, great; otherwise, learn it and use that as a marketable skill.<p>3. I&#x27;m not sure about jumping head first into a consultancy. I&#x27;d recommend getting some experience in a security field first. It&#x27;s hard to have credibility without some experience first.<p>4. Don&#x27;t bother with security+. If you want creds, go and take your favorite cloud provider&#x27;s security specialist exam. Cloud security is still relatively new, in high demand, and can get you immediate credibility with employers or clients.<p>5. I&#x27;m a big fan of real-world experience. Set up your own Linux server and try to attack it. Learn what some of the real world attacker techniques are. See some of the following:<p>Learn the Techniques, Tactics, and Procedures (TTPs) outlined in the MITRE ATT&amp;CK matrix (<a href="https:&#x2F;&#x2F;attack.mitre.org&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;attack.mitre.org&#x2F;</a>).<p>There are a LOT of &quot;Capture the Flag&quot; (CTF) events and writeups out there. Search for ones in a subfield you find interesting. Security is a HUGE topic. You&#x27;ll need to specialize. Do you want to reverse engineer code? Secure cloud applications? Help companies define their identity and access management strategy? There&#x27;s a CTF for all of those and then some. Do some googling around.<p>I have a lot more tips, so if you&#x27;re interested just reply to this comment with a way I can get in touch and I&#x27;ll reach out.
评论 #37208030 未加载
评论 #37207264 未加载
评论 #37235777 未加载
Amedeemus超过 1 年前
Having dev&#x2F;ops experience is a huge plus, there is a lack of security practitioners that know the pains of developers that and are able to offer technical security advice from experience.<p>A good place to start is by trying to distill some of your hard earned experience into a two hour session for a technical audience in the gaming industry, and offer that to potential clients. As a starting consultant, this is a low-risk way for clients to gauge your expertise and can give you a foot in the door, or at minimum valuable feedback.<p>Are there common security standards or regulatory compliance drivers for the gaming industry? Understanding the external security drivers for a company and being able to translate these drivers into pragmatic requirements or processes gives you a leg up compared to generic security consultants. Having knowledge of common frameworks can be beneficial. Look into NIST CSF, OWASP SAMM and the OWASP DSOMM (In order from high-level to hands-on)<p>If you want to pad the CV with some certifications, have a look at Paul Jerimy&#x27;s certification roadmap. <a href="https:&#x2F;&#x2F;pauljerimy.com&#x2F;security-certification-roadmap" rel="nofollow noreferrer">https:&#x2F;&#x2F;pauljerimy.com&#x2F;security-certification-roadmap</a> Skip the basic ones (such as security+), especially since you have dev experience. Go for CISSP if you want to offer managerial advice or go for the technical certs (eg. cloud provider certs) if you want to be more hands-on<p>For additional training, have a look at the list that NIST compiled: <a href="https:&#x2F;&#x2F;www.nist.gov&#x2F;itl&#x2F;applied-cybersecurity&#x2F;nice&#x2F;resources&#x2F;online-learning-content" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.nist.gov&#x2F;itl&#x2F;applied-cybersecurity&#x2F;nice&#x2F;resource...</a><p>Seek out your local OWASP chapter and attend some local meetups and security conferences. Talk to your peers at these events and learn what positions they hold, what challenges they have and what tips they may offer. Many OWASP projects are looking for (dev) contributors. Have a look and see if you can contribute to some projects with your experience. This is a learning opportunity and you&#x27;re helping the community, being a contributor can be a great way to show your expertise to potential clients. If you are using OWASP projects, the OWASP slack channels can be quite active and good learning resources too. OWASP conferences often have free or low-cost training too, as part of the conference.
评论 #37208033 未加载
ukuina超过 1 年前
I hear generative AI from Azure and elsewhere is being integrated into realtime threat monitoring, any word on how effective this is and what the impact in on the hiring landscape?<p><a href="https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;security&#x2F;business&#x2F;ai-machine-learning&#x2F;microsoft-security-copilot" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;security&#x2F;business&#x2F;ai-machine...</a>
brudgers超过 1 年前
Unfortunately pretty much every action you mention kinda smells like a way of avoiding direct rejection.<p>Coupons, booklets, degrees, certificates, and networking are not sales.<p>(Neither are designing a logo renting an office and printing business cards, in case anyone wonders).<p>No amount of competency can compensate for a lack of sales. No amount of credentials, either.<p>Sales come first. Before everything else.<p>If you aren’t selling your business is dead.<p>Good luck.
评论 #37208049 未加载
logicalmonster超过 1 年前
I think a game developer might end up being great at some kinds of security stuff because you already are used to thinking with a defensive programming mindset.<p>If you were building popular multi-player games for instance, you were probably thinking a lot about systems to prevent players from cheating or finding exploits to win. A lot of common web-development is much the same thing.
ezedv超过 1 年前
While coding skills are transferable, cybersecurity has its nuances. Dive into online courses like CompTIA Security+ and explore ethical hacking to bridge the gap. Networking helps too – attend cybersecurity meetups or webinars to connect with experts.<p>Your game dev problem-solving mindset will be a huge asset in tackling security challenges creatively.
badrabbit超过 1 年前
&quot;Cybersecurity&quot; is too general. Do you want to respond to incidents, do offensive security, vuln mgmt, vuln research, exploit dev, appsec, netsec,websec,cloudsec, setup systems for a security team or setup systems for product team with a sec speciality in their devsecops,etc...<p>But I gotta say, your background is best suited to focus on appsec (secure code writing) or seceng&#x2F;devsecops type person. Your masters I am afraid is near useless (having worked with several masters holders), I might even make a good bet your security+ will be more valuable.<p>There are many certs depending on your goal and they all have value depending on where you apply. OSCP will impress anyone for entry level of anything. But imho, sec+ and cysa+ give you enough of a taste to keep you well rounded on a lot of things. The public secret is that you should get an employer that would pay a ton of money into sans certs afer that unless you end up in appsec, devsecops&#x2F;seceng,vulnmgmt. Despite what edgelords say, you do learn quite a bit from difficult and lab intensive certs.<p>College grads and the masters holders I worked with severly lacked a hacker mindset. I think OSCP might help you with that tbh. You can&#x27;t think like you are solving a programming problem or working on a coding&#x2F;IT project. What you think you know in many ways will hurt you, which is one reason I am glad you are taking an entry level cert like sec+.<p>Just make sure you actually like security stuff, if not I highly recommend doing appsec&#x2F;devsecops stuff so you are still in familiar territory.<p>There is a lot of work in security you don&#x27;t hear much about where most people don&#x27;t know how to write any code. And there are jobs where you work with assemly every day (and they pay shit from what I have seen unless your talent is top tier), there is a lot of variety. But the fundamental remains, that everyone in security has to know how threat actors work and think, security exists because bad people do, that&#x27;s what it&#x27;s all about at its root, not technical things.<p>Entry level jobs will be easy to get with just your background but in my observation, entry level is entry level, you gotta take somewhat of a crappy pay (relative to tech pay) and then after like a year your pay can improve when you have proven yourself a bit.<p>A lot of the stuff I do would probably be an unbearable burden if I didn&#x27;t genuinely enjoy it. I work with people whose family gets in the way (spending time with them) or they do ok but do sort of the minimum with a lot of complaining because they&#x27;re just there for the pay understandable, a job is a job, but they&#x27;re not having fun at all.<p>Hooe that helped.<p>Oh, and stay away from startups and such and avoid ec-council certs like cancer. CTFs take a lot of time, I wouldn&#x27;t waste my time on them in your position, they won&#x27;t actually help you get a job unless it is a really competitive junior pentester gig and it&#x27;s a tiebreaker or something.
评论 #37208063 未加载
评论 #37217888 未加载