>knowledgable in all aspects of CS >know how to find vulnerabilities in your code >capable of developing exploits for vulnerabilities >can write advanced malware and rootkits >can penetrate your systems whenever they want >able to hack your phones and computer cameras to spy on you whenever they want
Are Security Engineers/Security Researchers the Chads of the tech industry?
Yeah, except we choose not to do any of that shit because it's illegal, and half of us have government security clearances that we'd really not like to lose.
Landon Walker
Most cybersecurity people are using Microsoft Office to compile stupid reports and policies though
Leo Nguyen
>have a security clearance >frequent Sup Forums
you're not fooling anyone.
Ryder Campbell
Just because we can doesn't mean we care enough to do so. Besides, a large portion of an engagement is literally spent in microsoft word reporting on what I found.
Jaxson Jenkins
he's probably referring to his walmart security ID
Hunter Cruz
>>knowledgable in all aspects of CS doubtful. most have IT degrees, right? CS != using a computer
David Ortiz
they probably do CS then get IT certs.
Joseph Robinson
i don't think that's generally true. maybe some places have CS programs that let you choose a more tech-y track though. i'm in the position of trying to pivot to cybersecurity for my phd after finishing a BS in CS
Angel Davis
>knowledgable in all aspects of CS
Blake Edwards
Security Engineers are more about writing security policies ,setting up firewalls, enabling encryption, checking your physical security etc, etc... They secure a large perimeter. Sorry kid.
Zachary Campbell
My university's CS program is more computation based. If you do IT systems it's mostly business with some computation minors.
Also good luck with your PHD. sincerely.
Andrew Diaz
Most people who call themselves security researchers are Pajeets who know how to run security scanners and then email you the results and expect payment.
Eli White
kek. A fair amount of them don't even require to know a programming language, let alone being >knowledgable in all aspects of CS.
Christopher Flores
I use Linux from Scratch with custom kernel. U can’t hack me.
Daniel Allen
What's your kernel?
Gabriel Miller
>using your own OS Who else /librarycomputer/ here?
Parker Flores
this is so fucking trueeee. on sharing platform called himself frigging elite, username with frigging hax0r.
Not him but I'm private sector contracted with a DoD project and I browse Sup Forums like every other day. I do what I want in my free time.
Levi Perry
I doubt the effort that goes into the reports is anything vs. the time spent on things you're actually reporting on
Seems like a field you're constantly learning
John Reed
Thoughts?
Xavier Garcia
full of shit
Jordan Rivera
>People more important/successful than me do not browse the same website I do!!! REEEE!!!
Tired of this shit
Jose Diaz
Which part?
Zachary Mitchell
He can penetrate my system any time ;)
Brandon Barnes
no, the true Chads are the underground hackers who come up with the techniques that security researchers only find out about years later.
Grayson Reyes
>typing on 2 keyboards simultaneously with thick gloves
Jayden Gonzalez
depends what type of "Security" they're doing. if its just running ip tables and periodically updating your firewall so the kids can't watch porn at school IT is enough. but the real security stuff is a fucking headache because you have to deal with shitty software, networks, databases, people being stupid and telling people their passwords so you have to set up multiple verification, have to know how to exploit things based on general "it does something like this" etc.. and that's not getting into the bullshit that is hardware vulnerabilities.
and you actually have to keep up to date on everything, because unlike with software engineering or whatever you can't just write something "that werks", you have to know the dumb shit people are doing.
Mason Nelson
can't leave fingerprints user. they'll track it back to him.
Leo King
>I can end the world with my NEETbux
Andrew Nguyen
When I worked for a DoD contractor I browsed Sup Forums on my work machine. I knew the IT guys and they didn't give a shit.
Eli Baker
Nope, it's pretty well known that the vuln research guys are far ahead of black hat skids, the government contractor money is just too good Shit like ms17-010 was sold to the government from one of those contractors, and you better believe that isn't the only one
Gavin Flores
Not them but >I can end the world with a bunch of 0 days They systems that control the world are far more secure than your typical dumbass on a PC, it has problems but you don't just buy a 0 day to hack the governments of the world. Plus once you start making any noticeable issue its going to be patched immediately into every security program in the world. Because hit reset on their computers and literally nothing changed except maybe a few days of you being annoying.
The entire anti-virus field is constantly watching for this shit, these specific bought exploits are for specific not general use. >Hey I'm a company and I want to fuck that company over / find out what they're doing >okay I'll use this exploit for them, and maybe that other company
not >hey i want to use this on 20 million people to build a bot net
Carter Bennett
Literally anyone in the military has at least a confidential clearance, so it's not that hard to believe.
James Miller
Any 18 year old that can enlist and pass a background check can get a Top Secret clearance.