![Austin Baker Profile](https://pbs.twimg.com/profile_images/1048987331389247489/GDtA0sYT_x96.jpg)
Austin Baker
@BakedSec
Followers
2K
Following
4K
Statuses
2K
IR at LinkedIn | focused on the intersection of data science, engineering, and cybersecurity | Scooping up APT and bopping them on the head | opinions my own
Joined October 2018
Build a career where you always bring something valuable to the table - that can be depth, breadth, or even just unbridled tenacity and grit. If you do this, you'll find there's a seat for you more places than not.
People often ask me what they should learn or study in cybersecurity and my advice is always the same; aim for technical excellence with things you love to do and aim for broad technical competency in as many related things as you can - a diverse base of knowledge is career gold
0
0
11
When you have a file lock on the investigation timeline so some goober associate doesn't try to merge in their horrendously formatted system timeline into the main one while you're compiling new IOCs to track (it me, I was the goober)
LOTO (Lock-Out-Tag-Out) cards exemplify peak analog goodness: combining a physical tag, industrial graphics, and a locking mechanism—a critical safety tool to prevent unintentional and unauthorized actions during maintenance. 🧵
0
0
3
As Brian notes, blameless does not mean without accountability. You have to be able to say "X failed because Y team made Z choice". Blameless means you don't call out individual persons and try to ruin their lives over what is typically an honest mistake.
"Blameless" is a very interesting word when it comes to investigations/post-mortems.😏 There are (at least) two very different senses of it: 1. No formal punishment is imposed or fault declared, but who did what where and why are still analyzed. 2. The problem fell from the sky.
1
4
10
@dinodaizovi Granted but I think the lament of most in-the-trenches practitioners is that A. Hardening is unevenly distributed and undo effort is often placed on securing niche attack vectors (the above) and B. Traceability is then neglected or upcharged by vendors for common vectors.
0
0
0
@HackingLZ Same thing happening with blue side certificates. Teaching investigation techniques that are largely irrelevant to modern security operations work - which has largely moved towards working entirely in EDR/SIEM land. The cert factory needs fresh bodies for our "unfilled" 1M jobs
0
0
9
@Hexacorn @anton_chuvakin Ah I see - thank you for clarifying :) I haven't run into one of these yet but it sounds fun :D
0
0
1