Hacker News new | past | comments | ask | show | jobs | submit login

I work for the Adversary Simulation arm at IBM X-Force Red. Prior to that, I worked at Mandiant and left as a technical manager for the proactive (offensive security) consulting branch.

I’d be happy to chat with you and answer any questions. I have interviewed and hired candidates for these positions many times, and have also been the one in the interview chair. My Twitter handle is in my profile.

In case you’re wondering, Adversary Simulation is a mix of research, implementation, and application of techniques to test security gaps in an organization. Typically, we use social engineering to gain access and must avoid detection by a variety of security measures. The goal is usually to gain access to something specified by the organization without being detected, as the testing is not announced to the security team in advance.




What would you recommend engineers learn or develop a practice for on the design and implementation side of software?


I've followed you there, but I think I can't send a DM if you don't follow me




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: