DeadPixelSec

520 posts

DeadPixelSec banner
DeadPixelSec

DeadPixelSec

@deadpixelsec

#DeadPixelSec | #InfoSec #Community | #CTF | Blog | Share | Educate | Evolve | Be |

discord.deadpixelsec.com شامل ہوئے Mart 2019
189 فالونگ3.5K فالوورز
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
I just wanted to let you guys know. I am still here, but I am really glad you are still here. Drop me a note so I can say Hey!
English
0
1
5
143
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
Its 2025, time for a new #infosec #cybersecurity #Resume Rules Update. Things are hard out there. TImes have changed, MASSIVE layoffs'. Shrinking tech budgets and more. Here is what I got. I. Contact Information & Online Presence: 1. Location Precision: Instead of just region, consider using a general location like "Greater [City Name] Area" or "[State] - Remote Considered." This balances privacy with giving recruiters a sense of your availability. Why: More specific than just a region, but still protects your exact address. 2. Professional Email & Portfolio Link: Use a professional email ([email address removed]) and prominently include a link to your online portfolio/personal website (if you have one). Why: Your portfolio can showcase projects, write-ups, and contributions, adding depth beyond the resume. 3. LinkedIn Profile Optimization: Ensure your LinkedIn profile is up-to-date and mirrors your resume. Use keywords strategically throughout your profile. Why: Many recruiters use LinkedIn as a primary sourcing tool. II. Experience Section – Beyond the Technical: 4. Quantify Non-Tech Achievements: If you've held non-tech jobs, quantify your achievements there, focusing on transferable skills. For example, "Increased sales by 15% through improved customer service strategies" (demonstrates communication and problem-solving). Why: Shows you can deliver results, even outside of a purely technical environment. 5. Skill-Based Grouping: Group your experience by skill area (e.g., "Incident Response," "Vulnerability Management," "Communication & Leadership") rather than just chronological order. Within each skill area, list relevant experiences (including non-tech if applicable). Why: Highlights your expertise in key areas and makes it easier for recruiters to see your qualifications. 6. Action Verbs & Impact Statements: Start each bullet point with a strong action verb and focus on the impact of your work. Use the PAR (Problem-Action-Result) format. Why: Makes your accomplishments clear and demonstrates your value. 7. Cybersecurity in Non-Cyber Roles: If you had any cybersecurity-related responsibilities in non-tech jobs (e.g., data handling procedures, access control), emphasize these. Why: Shows initiative and interest in security, even before a formal cybersecurity role. III. Skills & Certifications: 8. Tiered Skills Section: Create a tiered skills section. "Expert" for skills you're highly proficient in, "Proficient" for skills you're comfortable with, and "Familiar" for skills you're still learning. Why: Provides a clear picture of your skill levels and avoids overselling. 9. Certifications – Strategic Selection: List only the most relevant and in-demand certifications. Focus on those aligned with the target roles. Why: Avoids clutter and showcases the most valuable credentials. 10. Software & Tools Proficiency: List specific security tools, software, and platforms you're proficient with. Group them by category (e.g., "SIEM," "Vulnerability Scanners," "Cloud Platforms"). Why: Helps recruiters quickly identify your technical skills. IV. Education & Projects: 11. Projects – Showcase Your Skills: Include personal projects, CTF participation, bug bounty work, or open-source contributions. Why: Demonstrates practical skills and passion for cybersecurity. 12. Education – Keep it Concise: List degrees, relevant coursework (especially if you're early in your career), and any specialized training. Why: Education is important, but experience and skills are often prioritized in cybersecurity. V. Resume Formatting & ATS Optimization: 13. ATS-Friendly Formatting: Use a clean and simple layout. Avoid tables, images, or unusual fonts that might confuse Applicant Tracking Systems (ATS). Why: Ensures your resume gets through the initial screening process. 14. Keyword Optimization: Research relevant keywords for your target roles and incorporate them naturally throughout your resume. Why: Improves your chances of being found in ATS searches. 15. File Format: Save your resume as a PDF (.pdf). Why: Preserves formatting and is widely compatible. 16. Resume Length - Be Strategic: Aim for one page if you have less than 10 years of experience. Two pages maximum for extensive experience. Why: Keep it concise and focused on the most relevant information. VI. Networking and Continuous Learning: 17. Networking is Key: Actively network with other cybersecurity professionals. Attend industry events, join online communities, and connect on LinkedIn. Why: Networking can open doors to unadvertised opportunities. 18. Stay Current: Cybersecurity is constantly evolving. Stay up-to-date on the latest threats, vulnerabilities, and technologies. Why: Demonstrates your commitment to professional development. 19. Tailor, Tailor, Tailor: Always tailor your resume to each specific job application. Highlight the skills and experiences that are most relevant to the target role. Why: Shows employers you understand their needs and are a good fit for the position. VII. Networking, Continuous Learning, and Community Engagement: 20. Strategic Networking: Go beyond simply connecting on LinkedIn. Engage in meaningful conversations, offer help and insights, and build genuine relationships with other cybersecurity professionals. Why: Quality over quantity in networking. 21. Hacker Cons – Strategic Attendance: Attending relevant hacker conferences (like DEF CON, Black Hat, or local events) can demonstrate your passion and provide learning opportunities. List cons attended briefly, especially if you presented or volunteered. Why: Shows active engagement in the community. 22. Open Source Contributions: If you've contributed to open-source security projects, prominently feature this. Include links to your contributions on GitHub or other platforms. Why: Demonstrates practical coding skills and community involvement. 23. Bug Bounty Participation (Ethical): If you've participated in bug bounty programs (responsibly and ethically, of course), mention this. Quantify your findings or impact if possible. Why: Shows real-world vulnerability discovery skills. 24. Cybersecurity Community Involvement: Active participation in online forums, local meetups, or cybersecurity clubs can demonstrate your passion and knowledge. Why: Highlights your commitment to the field. 25. Mentorship (Giving Back): If you've mentored aspiring cybersecurity professionals, mention this. Why: Shows leadership and commitment to the community. 26. Personal Website/Blog (Showcase Your Expertise): Maintain a personal website or blog where you share your research, insights, or project write-ups. Include a link to it on your resume and LinkedIn profile. Why: Establishes you as a thought leader and demonstrates your knowledge. 27. Publications and Presentations: If you have published security research papers, given conference talks, or presented at meetups, list these with links if available. Why: Demonstrates deep expertise and communication skills. Final Touches: 28. Proofread Impeccably: Have multiple people proofread your resume for any errors in grammar, spelling, or punctuation. Why: A polished resume shows attention to detail. 29. Keywords – Beyond the Basics: Go beyond simply listing keywords. Understand the context in which they are used in job descriptions and incorporate them naturally into your resume. Why: Improves ATS matching and demonstrates your understanding of the role. 30. Quantify Everything Possible: Wherever you can, quantify your achievements with numbers, percentages, or specific metrics. Why: Data speaks volumes and shows your impact. 31. "Summary/Objective" – Use Wisely: A brief summary or objective statement can be useful, especially if you're transitioning careers or have specific career goals. Tailor it to each job application. Why: Provides context and highlights your key strengths. 32. References – Available Upon Request: Don't list references directly on your resume. Simply state "References available upon request." Why: Saves space and is standard practice. Lets keep making cybersecurity accessible to everyone. RT4<3. Be Good Do Good. #Infosecjobs #cybersecurity #Resume #linkedinopportunity #infosecurity #jobsearch #hiring #opentowork #cybersecurityjobs #infosecjobs #techjobs #careers #networking #linkedin #jobhunt #careergoals #accessiblecybersecurity #cybersecurityforeveryone #cybersecuritysimplified #demystifyingcybersecurity #cybersecurityexplained
English
4
5
17
2.1K
DeadPixelSec ری ٹویٹ کیا
JS0N Haddix
JS0N Haddix@Jhaddix·
[Sponsor] @TheSecOpsGroup just dropped multiple offers👇 and a chance to Win a FREE Pentesting Exam! 🎁 • Community Exams (Android/iOS – limited seats at 30£ each) • Newly launched exam on Kiosk Breakout (CKBPro ) - 90% Discount (Code: CKBPro-90) • Diwali Sale – 75% discount on ALL exams (Code: DIWALI-75) Explore their offers here🔗 pentestingexams.com/offer/ Now, Here is what you have to do to qualify for the free exam draw. Every action below = 1 entry into the draw 👍 Like 💬 Comment on your exam choice 🔁 Repost / Share 👥 Tag peers who should know 🔔 Follow @TheSecOpsGroup, creators of Pentestingexams.com
JS0N Haddix tweet media
English
13
15
63
11.1K
DeadPixelSec ری ٹویٹ کیا
TrustedSec
TrustedSec@TrustedSec·
Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services. In our new blog, @freefirex2 breaks down the types of service triggers that exist and how they can be activated with little to no code required. trustedsec.com/blog/theres-mo…
English
2
59
159
56.3K
DeadPixelSec ری ٹویٹ کیا
Nikhil Mittal
Nikhil Mittal@nikhil_mitt·
Glad to announce our Diwali deals. 20% OFF on the following (25% on more than one purchase) - All the on-demand labs (including lab extensions), - Bootcamps in Q1 and Q2 2026 (We have already announced dates for 5 bootcamps), - 10% OFF (15% on more than 5 seats) for our in-person training event - AltSecCON alteredsecurity.com/online-labs?ut… #RedTeam #PenTesting #Diwali
Nikhil Mittal tweet media
English
0
7
13
2.4K
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
Due to the move she packed all my shirts.. So she ordered me a new one.. Check out this swag, @deadpixelsec
Joe B. - BlindHacker  tweet media
English
2
1
12
347
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
If you're looking for something to do this afternoon I highly recommend going through a couple upskill challenges.
Just Hacking Training (JHT)@JustHackingHQ

🆓 Free Upskill Challenge 🆓 Joe Brinkley AKA @TheBlindHacker teaches how to implement effective Purple Teaming AND a practical walk-through of a Purple Team scenario! justhacking.com/uc/uc-purple-t… Whether you’re new to cybersecurity or looking to sharpen your strategic defense skills, this free mini-course will equip you with the tools and confidence to turn collaborative intelligence into influence. Throughout this Upskill Challenge we will cover: 🟣 Thinking critically about how offensive and defensive security integrate for business needs 🟣 Components of a successful Purple Team engagement 🟣 Creating a Purple Team scenario with a hands-on exercise with a fictitious company 🟣 Common pitfalls and pro tips for effective Purple Teaming What’s an Upskill Challenge (UC)? A UC is a free, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform. Did we mention that they're FREE!? 🤯 Just Hacking Training is a platform providing "Focused Technical Training for All Levels" in 60+ affordable, hands-on options in 4 categories: Courses, Free Upskill Challenges, Hack-Alongs and CTFs. With new content released twice a month throughout 2025, bi-monthly livestreams with John Hammond and our All-Star contributors and even some “Name Your Price” options, JHT will advance your career regardless of experience level or budget.

English
0
2
6
593
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
Happy Friday friends!! I did a thing, and I saw a learning opportunity and I'm taking it with @_RogueLabs . Well I got the classroom and swag box today. And all I can say is it's super dope, S tier in my book.
Joe B. - BlindHacker  tweet mediaJoe B. - BlindHacker  tweet mediaJoe B. - BlindHacker  tweet mediaJoe B. - BlindHacker  tweet media
English
2
1
13
461
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
I just typed this to a friend, wanted to share to you all the world at large. I understand you're going through an incredibly difficult time, and I want to acknowledge the pain you're experiencing. It takes immense strength to reach out, even when you're feeling overwhelmed. It's important to remember that your feelings are valid, They are VERY real, and I can't say any words you haven't seen or heard but I can say, it would suck to lose someone who has fought as hard as you have. All i can do is say find courage every day to do the damn things. Give and give till it's your purpose. Know you would be missed, Its harder to "un-kill" someone than it is to kill someone. dying is easy. way to easy. undying.. being a hero to many, and not because you are "flashy" or "propped up" but a real hero to folks that you help.. that's fucking hard and deserves to be noted as such. I take pride in waking up every day disappointing the family and people that for whatever er reason are disappointed in me. I now WANT to be here because its harder to be here than not. So i take pride every day I wake up. I take pride every time these people in their own head wish me to go away. My uncle gave in a year after my wedding. i saw what It did to the people I love, people who loved him. I hate it, but i am glad he is at peace, but I wish he was here to see the things he helped me do. He has no clue that i became "famous-ish hacker man" he has no clue how i made a small empire and help others.. quietly in his name as he did for me. Don't mis-out on seeing the people you help be the amazing people you know they can be!
English
2
2
8
429
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
Rising Above the Noise: Strategies for Thriving in a Challenging Work Environment and in communities. Have you ever felt like you're walking on eggshells, constantly second-guessing yourself or feeling manipulated? It's possible you're dealing with a narcissist. These individuals often use tactics like FOG (Fear, Obligation, Guilt) and CAVA (Criticism, Arrogance, Vindictiveness) to control and manipulate those around them. But you can rise above it. Here are some strategies I've found helpful: Recognize the Tactics: Understanding the FOG and CAVA patterns is the first step. Once you recognize these behaviors, you can start to detach emotionally from them. Don't take the criticism personally – it's often a reflection of the narcissist's own insecurities. Set Boundaries: This is crucial. Politely but firmly decline requests that are unreasonable or outside your job description. Don't be afraid to say "no." Protect your time and energy. Document Everything: Keep records of interactions, emails, and projects. This can be invaluable if you need to address any misunderstandings or accusations. CYA (Cover Your Assets) is key. Focus on Your Achievements: Don't let the narcissist's negativity overshadow your accomplishments. Keep track of your successes and make sure they are visible to the right people (your direct supervisor or other supportive leadership). Seek Support: Talk to trusted colleagues, mentors, or even a therapist. Having a support system can make a huge difference in managing these difficult situations. You're not alone. Don't Engage: Narcissists thrive on attention. Try not to get drawn into arguments or power struggles. Keep your interactions brief and professional. Grey-rocking (minimal emotional response) can be surprisingly effective. Know Your Worth: Remember your value and your skills. Don't let anyone make you feel less than you are. If the situation becomes unbearable, consider exploring other opportunities where you'll be valued and respected. Dealing with a business narcissist is never easy, but by recognizing their tactics, setting boundaries, and focusing on your own well-being, you can minimize their impact and continue to thrive in your career.
English
0
2
4
1.3K
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
If you think a course can take you from ZERO to Ethical hacker in 6 months, I'd also like to sell you a Zero to astronaut in 1 year!! Only $14.998.98
English
0
2
12
722
DeadPixelSec ری ٹویٹ کیا
Joe B. - BlindHacker 
Joe B. - BlindHacker @TheBlindHacker·
As we step into the New Year, let's remember: in cybersecurity, every Monday is a chance to patch the past and encrypt the future. Happy New Year, and may your cyber defenses be unbreakable!
Joe B. - BlindHacker  tweet media
English
0
1
2
258