I'm completely self-taught, and while on bail, I did a lot of responsible disclosure. I collaborated closely with CIRT teams, system administrators, website developers, and government agencies to ensure the remediation of over 3,000 web-application vulnerabilities. I wrote technical reports, provided remediation guidance, and validated patches to ensure that security issues were properly closed (in an informal capacity). My first bug bounty contribution took place in 2012 which was a GET-based reflective XSS on a subdomain belonging to Microsoft.
Over 30 private and public sector entities have sent me letters of acknowledgement. I've also been inducted into a number of hall of fames for uncovering vulnerabilities. In 2019, I was also ranked 11th out of 25,000 active researchers on a bug bounty platform.
I can't just walk into employment with my skillset because I'm not particularly talented, just proficient in web-application security and various methodology used to identify vulnerabilities. This leads me to believe that I should look for entry-level positions but I've been told I'm overqualified. Some opinions would be appreciated.
Stop telling yourself that. You wouldn't be #11 out of 25,000 if you weren't talented.
As long as you're open about your past and convictions, and your legal standing permits employment doing the work you'd do, then there's nothing stopping you from applying.
When you see a job posting then look at what the requirements are. If you fit more than half then you should apply. The things you don't know can be learned on-the-fly. You'll no doubt have interviews that try to find your strong points and weak points. You'll have failures. But that's not a problem: everyone has those.
This is your market: there are tons of companies that are hiring for your skillset and you'll land a job quickly if you're good enough at the core skills that are needed... which I'm sure you are.
Edit: I would also add that I'm also completely self-taught. The only computer class I've taken was typing... and I got kicked out for cheating because it was boring. I've been employed in software for over 20 years and currently make $160k salary in TX, USA building software for drones. There are a lot of people in the computer industry who are self-taught. Don't let that stop you.
Also, you should list the country you're in. Who knows, someone on HN could reach out with an opportunity.
If you have a criminal conviction it's unlikely you'll get through the screening process with a regulated business (like banking, insurance, pharma etc) due to some 'out of the hiring managers hands' constraints those industries have. I've seen exceptions to this in the past, where a senior manager strongly advocated for the exception, but it's _very_ rare.
I've worked with several security people with criminal convictions in the past at non-regulated, FAANG and FAANG-like tech companies. They also usually have policies in place to prevent hires with criminal convictions, but the exception process there is easier, particularly in security teams where these convictions are more likely to occur in strong candidates.
The biggest concentration of folks with backgrounds like yours have been at security consultancies, in my experience. Combined with the experience you mentioned with bounties, that would be the place I'd spend most time looking. You might still get rejected from some, for example those with customers that require criminal background checks for employees or security clearance you couldn't get, but there are still quite a large percentage where you could find work. Personally, I've had conversations with external consultancies who say things like "I know you require criminal records checks on all our employees, which we're happy to do, but I want you know >50% of my team will fail them".
A couple of other things:
- No matter where you work, with your background there might be some kind of 'restriction' placed on what you work on and/or how you work (e.g. can't work on project Type X or must work from Office Y). If you do get through a process, ask about this before joining, as it might have an impact on how much you'd enjoy the role.
- Be open about your background. You sound like you would do that anyway, but the more open you are the better, you don't want this to be a surprise to people. What you're looking for is a strong advocate on the hiring team, so building trusting relationships with people will be important.
Don't be too down on yourself, you might have made some bad decisions, but you sound like a talented professional. The criminal justice system exists for people to serve their punishment and then move on with their lives. There are companies that will be delighted to hire you because of your skills. Your road may be a little tougher than for others, but that doesn't mean you can't end up professionally happy, fulfilled and well compensated.
What you need is to show people that you're not going to cause trouble for them, which is more of a social skill that you demonstrate at the interview. Try to acknowledge that you did something bad, don't use words that diminish it, and try to explain that you want to move on and you now want to be a positive force.
There's going to be some natural questions that everyone will ask, so consider them as set-pieces and practice your answers.
The market is hot now, so get some interviews and see what comes up.
[1]: https://darknetdiaries.com/episode/60/ [2]: https://www.hackerone.com/
1. put together a one-page website, on a domain like firstnamelastname.com 2. Add a link to this page 3. Put a link to your website in your email signature
Done! Now everyone you ever email, if they want to know more about you, will know that you're _deeply_ proficient in certain domains, and it'll be up to them to decide that you might be a good fit.
Since you've got this particular charge against you, and the US makes it nearly impossible for people who have run afoul of the state to legally be paid, but you _might_ be able to open up a Stripe account, and create a "payment link" (https://stripe.com/payments/payment-links) for a one-off "roadmapping sessions" (https://doubleyourfreelancing.com/roadmapping/) where a company/team pays you $10,000 and you'll visit them (virtually or in person) for a day or two to talk about their thorniest security problem.
"The system" wants you to apply to (and be hired into) an entry-level position, but that would be a giant waste of your time and everyone else's.
I wrote this article for eager bootcamp grads, looking for their first job. You're not a bootcamp grad, but it _might_ be helpful to you: https://josh.works/remote-job-resources
Humble: "I have a bad thing on my record. I understand what I did wrong and want to move forward with my life, doing good work, and being a responsible citizen."
Jerk: "I got busted but those jerks din't see that I was helping them! It was all BS, dude!"
I'd gladly interview someone that got in trouble but shows humility about it.
Tom
P.S. I hate that this is true, and people will probably flame me for saying this. I don't know what you look like or how you dress, but you'll get a lot of mileage out of dressing and looking neat. (no tshirts, hair trimmed and not sloppy, etc.)
The price of a zero day exploit is quite high (for both sides) and I have friends who make much more money than I do doing this.
That said they mostly work alone or in small groups in their basement rather than at a large security company.
I would hire (or at least interview you) with a prior conviction though I am not hiring for a security role.
I don't think the conviction is a serious impediment for employment in this particular field (since it's for a non-violent crime) though it might warrant supervision on your employer's side and I can definitely see the larger companies not wanting to take the risk.
It depends what you did of course. In his case the only plausible "victim" was AT&T, and he disputes that too.
Explaining why you have a criminal record is going to be a lot easier to someone who already thinks they want to hire you.
Are you based in the UK? That's probably relevant, it seems like a lot of the cybersecurity sector over here is very friendly with NCSC & SC is required for a lot of roles.
Continue with "therefore I know about system security...". Write a book, charge a huge rate as a consultant. I'm serious. If you act like a beaten-down person, you'll be treated as one.
It's classic making lemonade from lemons, but it can really work. If not, you've lost nothing.
You clearly are talented so stop telling yourself that.
Have you thought about starting your own security consultancy?
I can't just walk into employment with my skillset
because I'm not particularly talented
Maybe in the world of cybersecurity where a lot of the talent is (from my outside perspective) pretty top end.For most tech industry jobs, you'll be way overqualified and the rest of the team will be in awe.
- Own your past. You've paid the price to society. Go public and tell your story -- be it a sentence, a tweet, a paragraph, an article, a podcast episode[1], or a book. Putting it all out in the open will make you more hireable.
- Don't fsck it up. Grow your integrity and ethics, or at least maintain them and keep them impeccable. Keep that old saying[2] in mind, it's so very true in a case like yours.
- Connect with others in areas you are interested in. (Twitter seems to be great for cybersecurity)
- You did the blackmail thing as part of your crimes, so realize it will take time and effort to gain trust.
- If you have that particular hacker mindset, you can quickly acquire the modern skill sets.
1. Maybe Jack might want to have you on Darknet Diaries at some point, if your story is interesting enough? He does it in a story-telling style that takes the pressure off the guest that they would normally have in an hour-long interview format.
2. (NSFW quote about bridge building) https://www.quotes.net/mquote/73833
It sounds a lot like pentesting in a web-focused team would match your skill set very well. But I suppose you already know that? I would not interview for Junior roles if I were you, or only if you're rejected higher p the latter. And if they tell you that you're overqualified, but the position and compensation appeal to you, just tell them you don't care and would be looking forward to work with them.
Regarding your conviction: This is most relevant if the clients require some sort of clearance. Also your employer needs be able to trust you, which means you have to demonstrate that you can be trusted (and add to that some blind trust from the would-be employer, but you not influence that too much).
There are also other security related positions, which you might enjoy. You already had contact with some large corps, maybe you could interview there?
If you want the job route then you need to apply to as many things as possible and find a story version that wont scare people off. Don't lie, just give them a well packaged insight into what happened in the past. You also have humility which is a great start.
Good luck!
Be upfront and spin your story like Kevin Mitnick, publish a few articles and maintain a blog with your name and identity.
Get a polished LinkedIn and post examples of past work, or what if's/what would you do.
You most likely will not pass a background check for FINRA/Insurance companies, but who cares - those companies suck to work for anyway.
You will/can easily bypass that wall by opening up your own LLC and selling consulting services, and verticals like "email security" or just basic/stupid DKIM/DMARC/DNS setup. You'd be surprised how much billing hours MSP's make just doing that basic stuff. I bill $150-200, and SOW's I've seen have it much higher.
So take that as a floor.
You can walk into many employers, and own the entire staff easy, you'd be surprised how low the ceiling is at most companies and how true talent or disorganized companies truly are.
I've interviewed CISSIP/Full blown cert/degree peopel that couldn't even parse together a hello world or explain how to do a HTTP GET. It's that bad out there now.
1) You're clearly very talented, the record you describe speaks for itself.
2) Use your past to your advantage. Larger more corporate companies might be afraid to employ someone like you (_might_!) but there are tonnes of startups that could see your record as an advantage. It's demonstrated proof of your abilities!
if maybe that's not your thing and you want "a job" I'm sure many people will be willing to help, me included. feel free to contact me on Twitter @high_byte
sure you can, give it a try
proficiency is talent on its own and being a self taught means only that you can learn (and being _very_ good at it, considering your story)
nothing's wrong with entry level job though, sounds like a solid place to start regardless of how much overqualified for that job you are - as long as you'll be doing what you love and there will be a clear promotion path for you
and even if there's none that job can still do you good if you threat it as a stepping stone - a warm up for better job to come
our past, things that happened before are important ofc but much more important things that will be, things that happens next
so chin up, looking forward to read your follow up success story in few months, best of luck!
Edit-also, you do have highly valuable skills and knowledge. Maybe make some 30 minute to hour long video tutorials. Then start drafting up a 1-2 week course plan for taking professionals up to your level if they start with some basic dev/ops knowledge.
Think about ethical and legal ways to teach things too.
Edit 2-or just go to any of the net sec teaching/tutorial programs and say you’d like to teach your knowledge in a legally viable/acceptable way within their frameworks. Etc.
I can't speak to your circumstances, but my team is hiring for folks like you and barring any policies I'm unaware of I'd be happy to help you make a connection. Details in my profile if you're interested.
On a more general note, there's currently a high, steady-state demand for AppSec, CloudSec, NetSec, and generalist technical security specialists with software backgrounds. There is work out there and I don't believe you'd have to accept an entry-level position to get it.
Also you may find it better to network with hiring managers vs filling out online job applications. The HR screening is going to bury you many times where a human could help you side step it.
Feel free to email the address in my bio and I can see if you're interested in talking to anyone in my network.
Good Luck!
In terms of employment, have you found it too difficult to make living off of bug bounties? Maybe there's crews that would see you as an asset. Or maybe contract based solo consultation?
https://www.riverloopsecurity.com/careers/
I can't guarantee anything, but just from what you've written here, I think they'd be interested in a conversation.
I guess blackmail & fraud are a problem but if it was related to hacking I guess you'll still find a job. It's gonna be hard, but there are companies that care about your hacking skills, not about your past.
> This leads me to believe that I should look for entry-level positions but I've been told I'm overqualified
You sound like a senior pentester if you'd ask me...
No employer needed! Just a willingness to read code at a low level and deep understanding of smart contracts and curiosity to exploit them in seemingly impossible ways. I think you could top Saurik’s bounty with a little more focus and dedication! Try it out and retire early!
Happy to have a chat -- I run VM for a large tech company and have a lot of openings
You could also write a book telling your story (if you're not a talented writer, there's ghost writers to assist) or do a Ph.D. with Ross Anderson and beccome a security researcher.
There are also a lot of podcasts/etc that would be happy to have you tell your story. Huge upside to that IMO with reach and sharing to help keep future people out of trouble.
There are people with lessor convictions from further back than you who still have issues finding full time jobs because of background checks.
smart employers would kill to get someone like you
I personally know a guy who got convicted at an early age for similar stuff, he never had any trouble finding work, even worked for some governments
any decent security startup would do anything to get you
bro I'm actually jealous
also: freelancing of course, rarely seen background checks for freelancers