TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How to be an independent security consultant?

17 点作者 notastartup超过 10 年前
So I&#x27;ve been wanting to switch from software development into pen testing and security consulting. I want to get some practical skillset enough to consult local tech companies. In general, need some materials which I can follow and learn as well as some guidance.<p>To become a software developer the path is pretty clear, you learn the language, build some stuff on your own, and take on real world projects. I find that this is a bit of a different path.

1 comment

tptacek超过 10 年前
Going from zero to independent consultant in appsec is going to be difficult. There&#x27;s a lot of work that needs to be done, more than all the serious firms can handle, but every good project has multiple bidders. For any project you&#x27;d actually want to work on, you&#x27;re not going to be competitive as a fledgeling indie consultant going up against Accuvant, NCC, IOA, and Leviathan.<p>My advice is, take a job with a consulting firm to learn the ropes. Then decide whether you want to sink several years of your life getting a new consultancy off the ground. I didn&#x27;t reliably match my FT salary after starting Matasano for several years.<p>In any case, if you&#x27;re looking for things you can do to make yourself marketable as a security consultant:<p>* (Easiest, but least-bang-for-buck): file bugs, particularly for companies with bug bounties that will credit you. Don&#x27;t look for bugs in companies that don&#x27;t offer public permission to test, though.<p>* Go looking for a vulnerability in a framework, programming language, or major library. By the time you find one, you&#x27;ll have expertise in that technology, which you can (a) add to your bio and (b) use as lead-gen for work.<p>* Find a pattern of vulnerabilities. If those vulnerabilities aren&#x27;t novel, design some countermeasure that fixes them all. If they are novel, you can stop there. Now put together a talk and submit at security conferences. In rough order of prestige, and certainly having left several out: Black Hat USA, CanSec, CCC, Black Hat Anywhere But USA, DefCon, Recon, Toorcon, RSA, Derbycon, OWASP.
评论 #8661064 未加载