What does a vulnerability verification specialist do?
Subscribe: Apple Podcasts | Android | Google Podcasts | Stitcher | TuneIn | Spotify | RSS
Lauren McCaslin, vulnerability verification team lead for the Threat Research Center at WhiteHat Security, discusses her path to becoming a vulnerability verification specialist and what it’s like to have a career focused on cybersecurity vulnerabilities.
In the podcast, McCaslin and host Chris Sienko discuss:
– When did you first get interested in computers and security? (1:15)
– What is a vulnerability verification specialist and what are your daily duties? (2:45)
– Is there a common procedure you follow when discovering a vulnerability? (4:15)
– What skills, certifications or experiences should someone be working towards if they want to become a vulnerability verification specialist? (6:00)
– Where do vulnerability researchers work? (8:55)
– Do you think certain certifications are on the rise or becoming less desirable? (11:10)
– What’s one thing listeners can do to get closer to a career in vulnerability research? (11:55)
– What are the tools and skills you use when communicating with clients? (12:55)
– Can you tell us more about the women of WhiteHat group and its purpose? (14:55)
– What can the tech industry do to help build a more diverse workforce? (16:30)
– Where does a vulnerability verification specialist fit on the career path and what other positions can they move into? (19:45)
– What projects are you working on at WhiteHat now? (21:35)
Additional Resources
– Join us in the fight against cybercrime: https://www.infosecinstitute.com
– Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast
About the Cyber Work Podcast
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Jeff Peters. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/aAVLnEzZN3k/