Answer the question
In order to leave comments, you need to log in
From QA to QASecOps?
Hello!
I graduated from the Faculty of Security. I worked a little in this direction as a student, worked with measurements and documentation. After graduating from the university, there was no work in this direction and experience was required. After analyzing the market and professions, I decided to get a job as a tester, thinking that it would be possible to leave this specialty for safety - I was wrong. There is always a lot of work and little time.
I want to move into the direction of system administration and security. There are basic knowledge of networks, OS, programming, cryptography (quite a bit).
Give advice.
- We need a list of information that will briefly help refresh the brain in the direction of information security;
- What tickets can you try to ask at work to start learning in practice (there is a DevOps department);
Thank you!
Answer the question
In order to leave comments, you need to log in
I want to move into the direction of system administration and security.Forward to enikey workers or junior IS specialists (hh didn’t dig deep, immediately issued 4 vacancies in the MSC without requirements for work experience in the specialty)!
I understand correctly, your problem is that there is a lot of work and little time? And you think a change of direction will solve this problem?
But to me, on the contrary, it seems that you are plowing on a project where all the juices are squeezed out of you and put (DELETED AFTER A LONG INTERNAL FIGHT) on your prospects and development. They lay down so much (fuck off the red line - I won’t write “lay down”) that they don’t even want to use a specialist with a good starting position in a serious and expensive direction.
Look for a company and a project of your own. Pentest is an expensive direction - if you find the right project, they will train with a bang.
to the account of a server in another country, I already answered you.
For VK, this location seems suspicious. and how logical. the token was created on your computer, and you use it in another country. although standalone tokens should be used from user devices, that is, where they were created and used there, this is ideal.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question