The description was a dream: “Have you ever wanted to hack a Car or an ATM? Would you like to socially engineer your way into critical infrastructure facilities?” I submitted my resume, interviewed and accepted a position as a full time Penetration Tester. Less than a year later, as a n00bie Penetration Tester…How Did I get here? What have I learned? What’s next for the industry? There is so much value in listening and learning from the experience of a seasoned industry veteran, but what does the n00b with “fresh eyes” have to say? …find out in this talk.
Brandon Edmunds is a member of the Coalfire Labs and Penetration Testing Team, he works with clients across all verticals to identify and remediate vulnerabilities in their business-critical applications and networks. He specializes in network and web application penetration testing. Brandon holds his GPEN certification and is currently enrolled in the Offensive-Security “Pentesting with BackTrack” course and going after his OSCP certification.