Preston: Continuous growth in cloud security
Summary
TLDRPreston, a security engineer at Google, shares his journey from software development to computer security. Initially disliking his software development role, he discovered a passion for red teaming and malware analysis, eventually transitioning into incident response for breached companies. His return to software development came with a deeper understanding of security needs. Preston highlights the importance of continuous learning in an ever-evolving field and emphasizes the value of mentorship for growth, acknowledging that nobody knows everything and that the journey in cybersecurity is ongoing.
Takeaways
- π Preston is a security engineer with Google.
- π He splits his time between forensic investigations and developing software solutions.
- π» His career in computer security began by accident after disliking software development.
- π€ He became interested in red teaming and malicious software analysis.
- π οΈ This led to a role as a consultant doing incident response for companies with breaches.
- π‘οΈ He spent several years responding to and mitigating threats for breached companies.
- π He returned to software development with a better understanding of the process and security needs.
- π¨βπ« Finding a mentor was crucial in his early growth and learning.
- π€·ββοΈ He emphasizes the importance of asking questions, as nobody knows everything.
- π Continuous learning is vital due to the evolving nature of security threats.
Q & A
What role does Preston currently hold at Google?
-Preston is a security engineer at Google, where he splits his time between performing forensic investigations and developing software solutions to improve workflows for security analysts.
What are Prestonβs primary responsibilities as a security engineer?
-Preston's primary responsibilities include conducting forensic investigations into potentially unauthorized activities in customer environments and creating software solutions to streamline investigation workflows for security analysts.
How did Preston's journey into computer security begin?
-Preston's journey into computer security happened by accident. He started in software development but quickly realized he disliked it and became interested in red teaming and malicious software analysis.
What led Preston to shift from software development to incident response?
-Preston's growing interest in understanding how malicious software is written and used led him to a role as a consultant, where he focused on responding to and mitigating threats for breached companies.
What experience did Preston gain from working as a consultant in incident response?
-As a consultant, Preston spent several years responding to and mitigating threats for companies that experienced breaches, gaining hands-on experience in cybersecurity and threat management.
Why did Preston return to a software development role after working in incident response?
-Preston returned to a software development role after gaining a better understanding of the development process and the capabilities needed for software to support front-line defenders in security operations.
How did mentorship help Preston in his career development?
-Having a mentor was instrumental in Preston's growth early in his career. The mentor provided judgment-free guidance, which helped Preston navigate 'dumb questions' and grow in the field.
What advice does Preston give about continuous learning in computer security?
-Preston emphasizes the importance of continuous learning, as the field of computer security is constantly evolving. Attackers frequently change tactics, so staying ahead requires ongoing education.
What makes working in security both challenging and rewarding for Preston?
-Preston finds the never-ending challenge of staying ahead of attackers daunting but also rewarding, as it provides a fresh perspective on the day-to-day work and keeps the job engaging.
What is Preston's perspective on the evolving nature of security work?
-Preston believes that security work is a journey that never ends, and while it can be overwhelming due to the constant evolution of attacker tactics, it also makes the field dynamic and exciting.
Outlines
This section is available to paid users only. Please upgrade to access this part.
Upgrade NowMindmap
This section is available to paid users only. Please upgrade to access this part.
Upgrade NowKeywords
This section is available to paid users only. Please upgrade to access this part.
Upgrade NowHighlights
This section is available to paid users only. Please upgrade to access this part.
Upgrade NowTranscripts
This section is available to paid users only. Please upgrade to access this part.
Upgrade NowBrowse More Related Video
5.0 / 5 (0 votes)