April 4, 2023
by Hacker Valley Studio
April 4, 2023
by Hacker Valley Studio
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
00:00 - Introduction
01:22 - What is Threat Intelligence?
02:17 - How did you get into Threat Intel?
03:20 - All Source vs Threat Intelligence
04:09 - What was the transition into cyber like?
07:03 - What is the salary potential for Threat Intel analysts?
09:00 - What skills do Threat Intel Analysts need?
10:09 - How to answer tough Threat Intel interview questions
10:47 - What does the first day on the job look like?
12:07 - What are the expectations of a Threat Intel Analyst?
13:18 - What expectations should an Intel Analyst have for their employer?
16:51 - Are threat intel feeds valuable?
18:26 - Chris’ first big threat intel “win”
22:24 - How have you changed as an analyst over the years?
24:22 - How to stand out in cybersecurity
27:24 - Advice for those breaking into Cyber Threat Intel
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
SaaS misconfigurations may be responsible for up to 63% of security incidents. Do your SaaS applications have risky OAuth grants and misconfigurations? Let’s not find out. We will unravel the complexities of OAuth and how attackers are using OAuth to...
In this episode, host Ron Eddings speaks with Chris Hughes, President at Aquia, Cyber Innovation Fellow at CISA, and cybersecurity legend. Special guest, Chris Hughes, was initially inspired to build a personal brand through a desire to mend his weak...
In this episode, host Ron Eddings is joined by Sr. Director of Red Team Operations at Coalfire, Pete Deros, to discuss the hottest topic around; adversarial AI. Ron and Pete discuss how AI is used and how the adversary is using AI so everyone can sta...
In this episode, host Ron Eddings is joined by Metasploit creator, co-founder and CEO of runZero, HD Moore. HD changed the world with Metasploit and he’s doing it again with runZero. Attack Surface Management can’t happen unless you have visibility i...
In this episode, Ron Eddings is joined by Penetration Tester, Instructor, International Speaker, Best Selling Author, and Podcast Host, Phillip Wylie. Phillip shares how pen testing and the need to educate people helped motivate him to speak at confe...
In this episode, Host Ron Eddings interviews Robert Kerbeck, author of Ruse: Lying the American Dream from Hollywood to Wall Street. Robert shares how his professional acting skills helped his career in corporate spying and espionage. Impactful Mom...
In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum and AI, Kim shares her love of computer...
In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero’s Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to persuading people to take a new approach...
In this episode, host Chris is joined by Erika Eakins — a cybersecurity sales ninja, podcaster, and co-founder at Teach Kids Tech. Erika opens up about her challenges entering tech and cybersecurity as a woman and her mission to serve the underrepres...
It’s a classic technologist conundrum: Should I build or buy the solution I need to solve a problem? The “Build vs. Buy” conundrum is faced by technology teams worldwide. To help approach this riddle, Chris Cochran speaks to two industry veterans, Sl...