Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Why Futaba Does Cyber Security!? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Today’s article is a special interview request on behalf CypSec Group , a company I’m currently partnered with that I provide the following services to via contract work for their clientele:

πŸŽƒ Penetration Tester - Offensive Security Auditing

πŸŽƒ Cyber Security Analyst - Vulnerability Assessments

πŸŽƒ SOC Analyst - Incident Response

πŸŽƒ Cyber Security Engineer - Secure Coding

You’ll get to know more about me and my background in tech and a lot more!

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today’s article is a special interview request on behalf CypSec Group , a company I’m currently partnered with that I provide the following services to via contract work for their clientele:

πŸŽƒ Penetration Tester - Offensive Security Auditing

πŸŽƒ Cyber Security Analyst - Vulnerability Assessments

πŸŽƒ SOC Analyst - Incident Response

πŸŽƒ Cyber Security Engineer - Secure Coding

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ Background

πŸŽƒ Insights

πŸŽƒ Industry

πŸŽƒ Outlook

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ Why Futaba Does Cyber Security!?

Background πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

πŸŽƒ "What inspired you to pursue a career in cybersecurity? Was there a specific moment or event that sparked your interest?">


The main reason I became a Hacker as well as a Cyber Security professional is to assist organizations that help track down and stop human trafficking operations, as well as anything along the lines of CSAM content distribution and a lot more.


You can find out more about that in this article here which talks about my sub brand that I plan to launch in the near future called, β€œThe Evil HERO”.


πŸŽƒ "What was your first cybersecurity job, and what did you learn from that experience?"


My first Cyber Security Job was at WePlayed Sports, an internship from my mentor, focusing on Cyber Analyst responsibilities, Penetration Testing and Offensive Security, as well as overall Security Research responsibilities. He took a chance on me and truly allowed me to finally gain REAL hands on experience that allowed me to apply what I’ve learned!


πŸŽƒ β€œHow do you stay updated with the latest cybersecurity trends and threats?"


I primarily stay up to date with the latest Cyber Security trends and threats via my Discord server community. It serves as a collective for various research and news material I can sort through and a lot more. It also serves to aid me with generating content creation ideas for my white paper research.


Insights πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

πŸŽƒ "What advice would you give to someone just starting a career in cybersecurity?”


Pick an area in tech that you like and apply Security to it! Cyber Security is EVERYWHERE!!πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ:

πŸŽƒ I.T. Help Desk

πŸŽƒ Software Engineering

πŸŽƒ System admin

and the list goes on! All you need to do is simply convert your skills to fit the bill and you're good to go!


The problem with pursuing a career in Cyber Security is folks are being lead astray, thinking they're gonna start out in Cyber from the get go. You first need to become proficient in a skill trade in tech in order to even begin "securing it". That all make sense?


πŸŽƒ β€œWhat certifications or skills do you think are essential for someone entering the field today?"


Anything from: HTB, TCM, and Offsec are practical certs that will set you up in the long run, as well as the ISC2 CC cert which is FREE and desired for entry level folks looking to break into Cyber Security!


If you’re going for anything from Comptia, then I recommend the following: Sec+, CySa+, PenTest+, Linux+, and of course, the classic A+ certification which is essential if you’re starting out in I.T.


πŸŽƒ β€œCan you share a story about a particularly memorable cybersecurity incident you have handled? What was the outcome?"


A recent incident I can share came from one of my previous I.T. Help Desk roles at TBG, β€œThe Bachrach Group”.


During one of my early morning floor sweeps, I ran into a system that was stuck in the bios as if someone were trying to pop the system physically. This might sound far fetched, but NONE of the I.T. folks (as sad as it is to say this) knew what they were doing, and for sure the folks that worked there, 99 percent of which were recruiters, didn’t know a thing about how to pop the BIOS for Windows systems. A report was made and further security measures were set in place to prevent stuff like this from happening again.




Industry πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

πŸŽƒ β€œCan you share a story about a particularly memorable cybersecurity incident you have handled? What was the outcome?"


AI is nothing more than a tool that will aid and augment our current abilities. It’s not capable of replacing us as sorry as this is to say.


A.I. is currently incapable of operating on its own. If it were, then there wouldn’t be an increase in folks looking to hire MANUAL penetration testers.


πŸŽƒ β€œHow do you balance the need for security with the importance of user privacy?"


This is a tough question to answer. With security, comes inconvenience.


Overall in order to balance it with the importance of end user privacy, you need to present the security to them without β€œforcing them” to apply it.


However, if this is a critical infrastructure, then sadly, even if it does inconvenience the end user, such as Zero Trust infrastructures for example, then it NEEDS to be implemented no questions asked!


LinkedIn ensures that ANYONE and EVERYONE you're connected to can SEE what you comment and react to! This includes YOUR posts as well! You can capitalize on this on top of what I've previously mentioned in order to get some serious traction!


πŸŽƒ β€œWhat's the most common cybersecurity myth you encounter, and how do you debunk it?"


GUARANTEED security! There’s no such thing! For as long as it’s man made, even if it’s by A.I which is also man made, FLAWS in the system will ALWAYS exist.


Outlook πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

πŸŽƒ β€œWhat's the most common cybersecurity myth you encounter, and how do you debunk it?"


I started it as a means to get my name and my research out there! Running a personal brand is KEY in order to get noticed.


That, and my end goal is to be an independent contractor that does their own thing! I like indulging myself in my research, so if I work for myself, I can do just that!


πŸŽƒ"What's the one piece of advice you'd give to businesses to protect themselves from cyber threats?"


KNOW YOUR SYSTEMS!


The type of security YOU need depends on the overall infrastructure that you have.


If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States