If you haven't visited www.clevelandart.org and checked out their online collection of art available through Open Access, you are really missing out. Check out a few of the images available free for use of any sort - including for brand marketing! You can access it at the following link: Search the Collection | Cleveland Museum of Art
The Security Grind
Musings on my past experiences, information security, and coffee roasting
Wednesday, November 5, 2025
Cleveland Museum of Art's Amazing Open Access Collection
Friday, January 8, 2021
Cover Letter Advice for InfoSec Job Seekers
- Why cover letters are important (and for what jobs they are most important)
- What hiring managers look for in a good cover letter
- Strategies for writing compelling ones
Why is a cover letter important?
All cover letters are important, and some cover letters are more important that others
The cover letter is important to employers because they show the employer
Whether you are capable of formulating sentences into coherent thoughts
Your attention to detail, based on the number of typos and mistakes it contains
How much interest you have in a job based on how much effort you put into writing a decent one
The cover should be important to you because they are:
Your first good opportunity to show genuine, personal interest in a job
A way to put your communication skills on display
And for those of you concerned about masking any communication weaknesses, keep reading
A chance to provide additional color and descriptions to best highlight your previous achievements
For certain jobs, a well-written cover letter is critical! Examples include:
CISOs, Directors, Managers, Team Leads
Anything related to management is a definite; as a manager you have to be able to communicate in writing, often to folks who are non-technical, be it senior leadership or folks in business units
Penetration Testers
What? It’s not all about popping shells and breaking shit? Absolutely not!
Writing skills are vital for respected pen testers, because as much as you’d like to think you are paid just to break into stuff, you are actually paid to deliver a report; and the more people pay for your skills, the more they are expecting a damn good report they can present to leadership
Auditors
Just about everything they do involves writing
Incident Response and Forensic Analysts
They have to document every single activity they perform in case the investigation leads to something that is court admissible
What are hiring managers looking for?
Trust me when I say most hiring managers dread reading cover letters as much if not more than you do writing them
They read an abundance of terribly written ones
They read ones that were clearly written for a different job
Or worse: the person copied it directly from an internet example, slapped in the company name, job title, and maybe the person’s name to whom they are directing it and just called it a day
They can tell right away how much interest you have in the job by how much effort you put into your cover letter; and this is why bad ones are REALLY bad
Here are the things hiring managers want to see
Your ability to write - bottom line, that’s what these are all about
Something unique about you that sets you apart from the other candidates
Whether you paid any attention to the job description and identified points that align to that particular job
A sense that you have genuine interest in the job and/or company
Let’s dig a bit further into each of these
Your ability to write, aka basic grammar and writing skills, which means:
No Typos - proofreading and eliminating misspellings is essential
Particularly, make sure you correctly spell the company’s name, the hiring manager’s name, and the title of the position
Carefully examine words that spell check may not catch such as, its/it’s, they’re/their/there, and two/too/to
Missing or gratuitous punctuation - most common is to overuse commas
Overuse of a thesaurus
If you occasionally have to search for another word for something that you’ve already used a couple times in your letter that’s fine, but don’t pick an terribly obscure word to use, and don’t omit common words in favor of “bigger” words just to sound more impressive - it’s not
Avoid cultural slang and cliches
Americans tend to incorporate informal sayings and cliches into their writing, and you cannot guarantee that everyone who will read your cover letter will be familiar with slang and cliche phrases
Something unique about you that sets you apart
There are various aspects you might include
Your approach to solving problems
How you engage with other company stakeholders
Ways that you have helped instill a culture of security awareness
Programs you’ve written (original code) or applied in innovative ways
You might also consider hobbies or personal interests - particularly if you can show their relevance to this job opportunity
Showing interest in the job and familiarity with the job description
Your cover letter should point to one or more tangible examples of how you align with the job posting
Specific technology experiences
A project your led
Incidents you helped resolve (omit protected info of course)
Your cover should convey tangible interest in the job
Outside of the pay, is there something you can point to as a genuine area of interest?
Will this role permit you opportunities to learn or gain skills of particular interest?
Is there anything attractive about the company as a whole?
What strategies work best in cover letters?
So now that you’ve given thought to the general content, the last step is putting it together into a cohesive unit. In this final section we’ll touch on the following:
Guide to basic formatting
Cover letter pitfalls to avoid
Tips on closing out the cover letter (many people struggle with this)
Guide to basic formatting
I will link to a couple of examples - as mentioned in the previous section though, do not cut and paste these. Use these as guides not templates
The important components are:
Your full name and contact info first
The date you’re submitting the cover letter
Remember to update this if you are starting with a previous one
Address the cover letter to the intended recipient
If you know the recipient’s name, use it with their proper prefixes (absolutely research this)
Mr., Mrs., Ms., Dr., etc.
If you aren’t 100% certain on this, simply “Dear Hiring Manager” works fine
One of the worst mistakes you can make here is using the wrong prefix - it’s potentially as bad as using the wrong pronoun
The body of the cover letter, which should include:
The title of the position to which you’re applying
What interests you in the position
Call out a couple specifics around how your experiences would make you a good fit for the position
Perhaps dedicate two short paragraphs to this
Include something that is uniquely you
A success, experience, interest, hobby - something that another applicant is unlikely to have in common
Close it out with confidence (not arrogance)
More on this below
Sign off
A simple “Sincerely,” and full name is fine
An actual signature is nice but not necessary
Pitfalls to avoid in cover letters
Restatements of your resume
They already have your resume; this is your opportunity to tell them something that either doesn’t fit on your resume, or formats better in writing than as a bullet on a resume
Errors, typos, misspellings, etc.
Yes - I mentioned this above
Yes - it is important enough to be repeated
Sharing your life history
If there is a particular aspect of your history that is relevant and important to this role, by all means mention it, but they don’t want to read a biography
Speaking in negative terms
This isn’t the place to discuss bad experiences in previous employment
The only exception would be maybe touching on why you changing jobs in a short time (anything less than a year tends to raise questions)
Tread carefully with this
Making assumptions about the position or inflating the role
Speak to the elements of the job that are included in the description for sure, but don’t try to impress them with how you’ll turn an entry level job into an executive leader of the company
Embellish the importance of mundane experiences
So you don’t have a “Wow” experience to include - that’s fine; focus more on your approach to the job and your interests then
No one wants to hear how you revolutionized technology at your previous company by enabling a feature in an application
Closing out the cover letter
You don’t need to summarize all the previous points in the closing piece
It’s good to briefly restate your interest in the position/company
The last bit (one sentence, two max) should show confidence - things like:
Look forward to next steps, sharing vision, contributing value, etc
Focus on the future and what you’ll do for them rather than what you’ve done in the past
Best of luck to all of you on your job searches!
Sunday, September 20, 2020
Resume Advice for InfoSec Job Seekers
- Keep it short and simple
- Even for people who have worked in the industry for a decade or more, a 2-page (one piece of paper, front-and-back) should be attainable
- Review and update your resume for every job you apply for
- People who have the most success with job applications, make sure all of the documents they provide (resume, cover letter, references and job application responses) are crafted and targeted to the position for which they are applying
- Job experiences should be relevant
- This does not mean that only InfoSec experience counts; this means each experience should be angled towards showing how you gained or applied InfoSec-related skills within that experience
- As you prep your resume for each job you’re applying for, think about previous experiences in terms of how they relate to the prospective role
- Each experience should answer the question: What was your individual contribution?
- Saying you participated in a project or were on a team is fine, but do not forget to highlight what your specific contributions were to those projects or teams
- If you collaborated with a couple other people on a single task, focus on the elements you provided
- Ditch the generic “career goals” section
- The operative word here is generic. If you are passionate about something and can make this sound like a personal mission that is important to you and is uniquely you, then leave it in
- If all you have to say is you “want to get a job in InfoSec, hack all the things, and protect stuff,” then at best it’s not doing anything to help you stand out, and at worst, it shows you’re just like everyone else who wants to work in InfoSec
- Instead - use that real estate on your resume to say something that helps you stand out. Talk about something uniquely you - a group you founded, a tool/script/program you created, a policy/strategy/marketing campaign you came up with, or a personal philosophy that explains your approach to InfoSec
- Streamline your technical skills, and focus on what’s important
- It’s 2020 people, and it’s fair to assume everyone has at least passing knowledge of how to use Microsoft Office products. Unless the job explicitly mentions you need to be proficient in Word and Excel, there is no reason to list them
- Unless the job says Windows or Mac experience is required, take them off
- Caveat: If a job expects that you are proficient in a specific operating system and can perform command line scripting (as an example), something in your resume should highlight your experience in that area
- Avoid inflating promotions or title changes into multiple positions
- Sure, if these were distinctly different roles within the same organization, list them and touch on those unique experiences
- If you were basically doing the same job the entire time, and had some title changes along the way, either pick the most current one and attach all of your experience to that one, or list all of the titles but consolidate them to a single collective experience
- Avoid doxxing yourself through your resume
- If you are posting your resume on sites like LinkedIn or Glassdoor so it can be viewed publicly, you probably don’t want to include your home address and personal cell phone number
- Keep multiple versions of your resume if you have to - one that you use for public display that says “Contact info available on request” or that just displays an email address; and one that has the rest of the details that you would include with job applications or provide to recruiters
- Do not put your date of birth or Social Security Number on your resume
- <Sigh> Just. Don’t.
- Scale back the details of your education based on your work experience
- If you are applying for your first job or (especially) an internship, the company may specifically want to know your GPA, otherwise it’s not necessary
- If you’ve been working in the industry for a number of years, then GPA and graduation year are probably both unnecessary
- In all cases though, do include the school you attended - large or small. This can become a conversation piece in unexpected ways, and that’s a good thing
- Keep references separate from your resume
- This helps to conserve space on your resume and let’s you decide when to provide them (and have more control over who you provide at the time references may be contacted)
- Highlight volunteer work, regardless of whether it is related to InfoSec
- Shows involvement outside of work, and your desire to give-back to the community
- Link to any InfoSec work you do on your own time
- A great to way do this is to start a blog, which can serve as a supplement to your resume
- If you maintain an active GitHub of personal work, include a link to that as well
- Check out my tips for creating cover letters (I still need to pare it down a bit)
- Other suggestions - less critical than the aforementioned ones
- Create a designer, one-page resume that focuses more on keywords and eye-catching layout in contrast to more traditional resume
- This is a good one to carry with you and can hand out at career fairs or conferences
- Include a section for groups you participate in outside of work and/or hobbies
- This could also contain memberships to professional organizations
- Job applications should not just be a copy and paste of your resume
- While it’s certainly more work, you don’t want to miss the opportunity to share additional information about your work experiences
- One strategy for this could be to emphasize keywords in the job application, and emphasize work experience in resume
- Include your social media accounts if they are suitable for professional purposes
- LinkedIn and Twitter are the typical ones used for this purpose
- Mention some of the learning opportunities or other activities you have pursued on your own time
- Local or virtual conferences attended, online classes or other self-taught efforts are all good to mention
Thursday, July 30, 2020
Clearing the Queue
- They want to get a handle around the intake of new requests and improve the management of the work in general
- They are looking for enhancements to their business continuity and disaster recovery processes
- They they need to improve the stability of the website's backend services running ColdFusion (yes, in 2007, people still ran ColdFusion)
- Set up monitoring - figure out a way to detect the problem before it occurs by identifying leading metrics that are indicators of the coming problem
- Set up alerting - once you've determined how to monitor the leading indicators, further enhance the process (and response times) by alerting folks that actions need to be taken
- Simplify the process - break down the steps to take in such a way that all of the logic can happen behind the scenes, and document the process so others can follow it without having to be experts
- Automate the process - once you're confident that the process is working consistently and you've defined it in a way that doesn't require expert intervention, hook the alerting and resolution logic together so that it automatically resolves itself
Wednesday, July 22, 2020
Creating My OWASIS - Part 3 (Putting the pieces together and wrap-up)
- Replace "<username>" and "<password>" in ftpers.txt
- Run "./Ftp_Remote.sh"
- After it has automatically ftp'd the Remote.sh script to all of the server in tn_ips.txt, it will prompt you for a username and password to use to telnet into all of the machines and run the Remote.sh script
- Run "perl AutoSSH.pl ssh_ips.txt"
- This can be run concurrently with ./Ftp_Remote.sh, as all of the processing is done remotely, so it will not slow down your local machine.
- When Ftp_Remote.sh completes, view the log file in an editor that allows you to do block select mode (textpad or ultraedit32), and block select only the first character in every line of the file, and then delete that block. (This way both log files have the same format)
- Run "cat SSH_connections-<datestamp>.log TN_connections-<datestamp>.log > Master_Inventory.txt"
- This will populate a single file with all of the output from Telnet and SSH servers
- Run "perl Parse2csv.pl Master_Inventory.txt > <output file.csv"
- I usually make an output file with a datestamp similar to the tn and ssh_connections files
- Open your <output file>.csv file in Excel
- There will be three disctinct partitions/ranges to the file
- Add text labels above the first row in each partition as follow:
- Partition 1: Hostname, Brand, Model#, OS Version, Processor Cores, IP Address
- Partition 2: Hostname, WAS Versions
- Partition 3: Hostname, WAS Home, Server Name, Server Status
- Select all of the cells in the first partition/range, goto Data, then filter - advanced filter; check unique records only, and OK
- Repeat for each of the three partitions
- Copy and paste each partition (text labels included) into its own sheet of a new Excel Workbook
- Rename the three sheets in the new workbook as follows:
- Sheet 1: Machine Info
- Sheet 2: WAS Versions
- Sheet 3: Server Info
- Proceed with any formatting, sorting, etc. of your choice
- If you so choose, now that you have a well formatted Excel "Database" file, you can import this into Access to run queries against - each sheet is equivalent to a table in a database - hostname is the primary key.
Friday, July 17, 2020
Creating My OWASIS - Part 2 (Solving the problem)
Thursday, June 18, 2020
Creating my OWASIS - Part 1 (Setting the stage)
During the second-half of 2007, I did a brief stint at a bank - which was exactly the wrong time to be starting a career at a bank. As you may recall, this was right when the mortgage crisis was beginning to come about, and it lasted into 2009. While I was only there for 6 months to the day, I got to watch the stock value plummet to ~10% of what it was when I started. Within the next couple years long after I left, the bank was purchased by another bank and MANY people lost tons of money on the deal.
How is any of this relevant to my next story?
I was originally brought in (along with one other person) to be part of a new group within the Middleware Management and Support team, specifically to assist with doing research and development into new uses for WebSphere Application Servers. My role was to assist with the development of systems that would improve the throughput of EFTs (Electronic Funds Transfers) between the mainframe and the downstream ATMs and Web endpoints. However, just as I was about to join the team, this project went on hold due to the IT Architecture team deciding to begin development using Weblogic instead. With this, my role immediately changed from building and testing WebSphere in new applications, to just maintaining the existing WebSphere systems like the rest of the team. The problem was, there was already a team of people that supported the existing WebSphere environment, and between the shift in technology focus away from that team and the sudden downturn of the stock market, they were reluctant to want to show the new guys the ropes.
Humans have an innate sense of impending doom which fires up long before the rational part of the brain realizes what is happening. This then engages the fight or flight response in order to preserve oneself. The way this was demonstrated within my team, was relegating myself and my other new coworker to the most basic of tasks, and barely lifting a figure to get us pointed in the right direction. They were afraid training us would train themselves out of their jobs; in hindsight, they were probably correct.
I was literally given one real, personally-assigned project to work on independently, and this was to create an inventory of the existing WebSphere Application Servers. Mind you, the WebSphere servers numbered in the hundreds, and people had long since lost track of what they all were, which ones were still in use, and basically what was even still powered on. Being the resourceful type, and also BORED OUT OF MY MIND, I decided to think of ways that I might be able to automate the process and - most importantly - save myself time if I ever had to do this again.
I've always said that the best programmers I've known are the laziest. This may sound counterintuitive on the surface, but in reality, it is the fact that they are lazy that they seek ways to avoid having to perform repetitive tasks. Logging into hundreds of servers and running a command to see if WebSphere is installed, then document the version number, is the pinnacle of repetitive tasks.
Fortunately, this assignment (which I assume was just intended to be busy-work keeping me occupied anyway) came with no instructions for how they wanted it completed, nor a deadline for when it was to be completed. And so, I took this as an opportunity to learn some new skills and create the best damn inventory process possible.
Continued in Part 2...




