In 2008 I joined a security consulting company in London trying to do something different. After working for an antivirus company for a while I wanted a change. I’ve been looking for a job in London for nearly a year… so…. when this magic consulting opportunity popped up I jumped on it, even if I had to sacrifice a bit of a salary cut. And… I have never done security consulting work prior to that, plus I am/was/will be always quite anti-social… so… understandably… I was terrified.
In my new role I got to do work for two ‘branches’ of the company’s security team:
- one that did pentesting, code reviews, and forensic work on credit card breaches (PCI) in a private sector, and
- the other one that I would only occasionally support: the forensic team that did the ‘heavy on mind’ work for law enforcement.
Without going into details: I had to quickly learn a new set of soft and technical skills, fail miserably both in acquiring them and using them on my first IR gig, learn to appreciate the fact that I am not the smartest in the room, or that ‘technical knowledge alone’ doesn’t actually sell, and kinda by accident… eventually start adapting to this new, emerging DFIR market.
Having the reverse engineering skills helped a lot. I was able to quickly make some sort of impression on a number of people – both peers and clients; I was ‘flying’ through the samples they were sending my way and was providing them answers faster than anyone else could.
This helped, and became ‘my thing’ in the next consulting company I worked for as well; it helped the company win some brownie points with a number of customers, and organizations, and most importantly – the relationships I built at that time I still cherish today.
You may be wondering why am I writing this?
Mid-life crisis? Mental breakdown?
Hmm probably, but not really, I hope 🙂
10 years later I must admit I think of these times with a bit of a nostalgia, and, probably like many people in the industry who share a similar experience, I can’t think of it any other way than ‘what a crazy decade it was, but I loved it’… We all literally not only witnessed, but also helped to build a new industry!
Soon after I entered this forming ‘scene’ we had an avalanche of reports in the news: aurora and apt craze, stuxnet, a torrent of never-ending white papers about state-sponsored attacks, Snowden leaks, any leaks really, lulzec, anonymous, POS Malware, ATM malware, more ATM malware, lots of hacking stunts; even migration from old-school social media to new became a thing; blogs to Twitter, then random coding web sites migrated to Google code, github, the Usenet and CodeGuru/CodeProject to Stack Overflow, and so on and so forth… oh, and let’s not forget the ‘everyone is now coding in python’ bit – the coding lingua franca du jour replacing perl, bash, vbs, C and everything else, and then the decompilation magic of the Hex-Rays decompiler, the ‘wow’ effect of first iphone jailbreaks, superawesome pwn2own awards, Project Zero, the new security measures (ASLR, DEP, etc.), development of sandboxes, spy companies being hacked, doxed, then emergence of ‘new’ security industry branches: threat intelligence, EDR, and threat hunting, and tones of new reversing and forensic projects that completely changed the way we do things from manual to automation and conquering new platforms (volatility, plaso, SIFT, autopsy, xdbg64, radare2, remote forensics, etc.). Lots of new great & strong researchers and developers joined the community as well, plus, we even started sharing! And while a bit less related – we observed lots of company acquisitions — bye bye boutique companies. Welcome to big business taking over. And… yeah… imagine that 20 years ago… Windows now hosts Linux.
For me personally, the luck put me in the shoes of a programmer, localization engineer, writer, an investigator of early PCI DSS breaches, forced me to do some pentesting (not the biggest fan, for some reason it doesn’t click with me), and code reviews, then people management, project management, some compliance work, accounting, company secretary, and finally introduced me to a number of super smart individuals. And in the end these experiences helped to land more interesting jobs at a number of companies I would never dream of joining (ok, partially, because I didn’t even know they existed! :)).
As they teach you during MBA – people networking is the key. And it’s the people networking that I never believed in too much… that somehow happened accidentally! This decade was probably for the first time in my life I felt I was in a right place at a right time. The Hexacorn project was built upon all this sentiment and excitement, the ideas I sat on for a long time eventually finally had its outlet and I launched it in October 2011. Simultaneously, between 2011-2018, for 7 years, I held the FTE job at various fintech companies while spending private time cracking problems for my Hexacorn clients and doing researching. To be honest, I do hope I can come back to it in the future, but now I am taking a break (It actually feels good to just focus on one [new to me] thing and not having to work till 2-3am on the moonlighting projects).
Again, why the heck am I writing it?
As you throw yourself deep into one of these ‘specific’ infosec subjects, let it be reversing, forensics, log analysis, SOC, CERT function, threat intel, threat hunting, writing tools, or even less work-related events: attending conferences, doing networking and blogging…. the other trends in the industry progress with a really rapid pace!
The never-ending paradox of being in the middle of it, but also totally outside of it is… well… quite depressing.
We can’t forget about our progressing age either.
You now work with a new generation of security pros who know more, think faster, and know everything about the ‘current state of affairs’ more than you
I don’t know what they do, but they seem to know all the memes better than me!!!
Yet another reason to feel obsolete, redundant – I guess it’s time to give up and retire.
From ‘the youngest chap in the room’ a few years ago you suddenly become that ‘the oldest one’…
How the heck did THAT happen?
As you get engaged with the younger, and smarter, as you talk, as you read what they write, as you feel their excitement you will hopefully realize that your experience actually does have a bit of a benefit. First of all, you can quickly adapt. Secondly, you have ‘seen it all’ (okay, lots of it, at least). Thirdly, they are not against you, and may even see you as a teacher and friend – and on that note – you can learn a lot from them too! If you are lucky, they are actually like you, or better than you, greedy for knowledge, really fast, and just a bit younger. You may become their mentor, but also… their mentoree.
And with that… time for an explanation: why did I write all this…
Over XY years ago almost all my buddies at the uni were learning Java. It was the FUTURE.
While they were talking UML, Eclipse, etc. I was focused on x86 assembly language, the art of cracking games, bypassing protectors, and understanding how demoscene demos and viruses are made. Most of these guys were shrugging it off – I was just a weirdo and had my weird hobby… While they became unbeatable masters at Java, I got to skim through stuff, and learn and program some of that Java (my BSc project was Java-based!), I got to use my x86 / x64 asm skills a lot, I got to learn how to C, Pascal, Delphi, VB, VBA, VBS, unix, Windows, osx, basic Objective-C, use tools, build own tools, and face a lot of challenges they will never face (e.g. cracking a password for a very obscure private application), etc… And most importantly, I never learned _any_ of it fully. Yup. ended up being the sad Jack of all trades.
Is that wrong?
I don’t think so. I learn new stuff every day, I constantly ‘index’ interesting bits from every blog/twit I read, and while I am aware my knowledge is becoming obsolete every single day, no doubt, I know that I am also capable of things, given an opportunity.
I think we are forced more and more to be IT Security generalists. Ones with an interest and capability to deep dive if necessary, and in many topics new to us. We don’t actually build things anymore. We delegate. We try to understand the big picture, but more importantly – we try to understand it in a security context. And then in a business context. So that we can delegate with a guidance. Over and over again I learn that people outside of IT SEC don’t know what I am talking about and it always takes an effort to explain this stuff to others. No, they don’t know what you do. They don’t care/know/couldn’t be bothered. So, you need to explain, explain again, and then rinse and repeat. By the sole nature of being on this cutting edge we end up being preachers, educators, and yeah, as some describe themselves – evangelists or strategists.
One thing for sure, it’s not for everyone. It’s not comfy to know that 10-15% of it. ‘Real’ developers or architects won’t like it. ‘Real’ pentesters won’t like it. ‘Real’ compliance guys won’t like it. And ‘real’ hardcore forensics analysts or ‘firewall’ guys won’t like it either… The IT Sec is now a soup of everything else, an amoeba, and amalgamate, sometimes a bit of a mess that hits the fan – to deal with it you need to feel comfy with… the chaos.
Perhaps this post is my way of dealing with the impostor syndrome. Perhaps it’s just a fake infosec wisdom I am pretending to understand. One thing for me _IS_ sure, and I will preach it to everyone who dares to listen: never rest on the laurels. While I am looking back at my past I must honestly admit that in my own eyes I did commit this sin twice in my career and it took me a long time to catch up afterwards. Each time.
So… DO NOT REST ON LAURELS.
As long as you don’t rest on laurels, you are an impostor with a purpose – probably the only meaning of our infosec life…