My name is Kyle and I work in offensive cybersecurity operations, primarily in the areas of penetration testing and adversary emulation. I help organization’s lower risk by performing assessments in the areas of adversary emulation, purple teaming, and penetration testing. In my spare time you’ll find me reading, hunting, fishing, or watching sports.
📖 🦃 🎣 🏈 🏁
I work with a team of highly-skilled professionals that perform penetration testing services with the ultimate goal of reducing risk by finding security vulnerabilities before others do. My role offers me the opportunity to drive security initiatives that directly impact the attack surface and incident response procedures across the company.
The typical day as a penetration tester varies a lot. My day could involve any combination of the following:
I used to work as a cybersecurity specialist for an Israeli cybersecurity startup. I spent my day educating security professionals such as SOC analysts, cybersecurity analysts, incident responders, and threat hunters. I would coach them through **simulated incidents (such as ransomware infections) that used various malware strains in a virtual corporate network. The live incidents were centralized around defensive (blue team) or offensive (red team) operations. Topics would include networking, cryptography, forensics, intrusion detection, endpoint forensics, web application hacking, and much more. During training scenarios I would leverage my knowledge to help teams navigate enterprise tools such as Splunk, Palo Alto, Carbon Black EDR, and other open-source tools such as OWASP Zap.
Prior to my career in cybersecurity, I worked as a financial advisor with a Fortune 500 financial services company. As a CERTIFIED FINANCIAL PLANNER™ professional, I acted as a fiduciary that identified investment strategies for clients that best fit their goals.