My name is Kyle and I work in the Matrix. Not really, but pretty close to it - I am an offensive security professional that specializes in penetration testing and adversary emulation. Ultimately, I help organization of all sizes mitigate risk by performing a variety of technical security assessments. These assessments can be either be nuanced or broad in scope, all dependent upon the organization’s requirements. In my spare time you’ll find me reading, hunting, fishing, or watching sports.
📖 🦃 🎣 🏈 🏁
I work with a team of highly-skilled professionals that perform penetration testing with the ultimate goal of reducing risk by finding security vulnerabilities before others do. My role offers me the opportunity to drive security initiatives that directly impact the attack surface and incident response procedures across the company.
The typical day as a penetration tester varies a lot. My day could involve any combination of the following:
I used to work as a cybersecurity specialist for an Israeli cybersecurity startup. I spent my day educating security professionals such as SOC analysts, cybersecurity analysts, incident responders, and threat hunters. I would coach them through **simulated incidents (such as ransomware infections) that used various malware strains in a virtual corporate network. The live incidents were centralized around defensive (blue team) or offensive (red team) operations. Topics would include networking, cryptography, forensics, intrusion detection, endpoint forensics, web application hacking, and much more. During training scenarios I would leverage my knowledge to help teams navigate enterprise tools such as Splunk, Palo Alto, Carbon Black EDR, and other open-source tools such as OWASP Zap.
Prior to my career in cybersecurity, I worked as a financial advisor with a Fortune 500 financial services company. As a CERTIFIED FINANCIAL PLANNER™ professional, I acted as a fiduciary that identified investment strategies for clients that best fit their goals.