Career Stories
Hassassin,
Dec 14
2022
Gary Ruddell is now the Regional Head of Cyber Threat Intelligence at a global financial organization, but he didn’t always work in cybersecurity.
Starting off as a communications specialist in the UK’s Royal Navy who then progressed to military intelligence, Gary left the military in 2013 and has since worked as a Security Operations Center consultant, Senior Risk Analyst, and Threat Intelligence specialist.
Fun facts about Gary Favorite movies: The Prestige, Blade Runner, and Interstellar. Favorite games: Metal Gear Solid, Splinter Cell, and Uncharted. Favorite tech: My Ubiquiti networking gear, the Apple ecosystem, Playstation VR, and Leica Q2 camera. Hobbies: Photography and writing. |
I’ve always been interested in hacking as a kid. I remember watching the movie Hackers Loading Preview...
As I prepared to leave my military intelligence role in 2013, I heard that some units were working on cybersecurity at a very basic level (i.e., tinkering with Kali Linux on a few computers nothing compared to the military cybersecurity operations we have today), that revived my interest in the topic; it was something interesting and technical that offered plenty of new skills to learn.
Get hired with HTB
Hack The Box is the heart of the hacking community and the best resource to find cybersecurity jobs worldwide.
The life of an intelligence operator is all about collecting information and turning it into intelligence so that decision-makers can make critical choices. Where in the world you do it, and with what tools, is what makes it interesting.
I spent time carrying out operations in the Middle East, on the front lines embedded with some of the UK’s sharpest military units. We used classified systems and techniques to gather information on high-value targets so that they could be detained. I can’t really share specific examples as I’m bound by the Official Secrets Act and would need government clearance to do so. However, I can say that when all the intel comes together, it’s an incredibly rewarding experience. (The movie Zero Dark Thirty Loading Preview...
Having a military background helps because it cultivates qualities and attitudes that you need to succeed in cybersecurity:
Discipline
Camaraderie
Continuous learning
Everyone, regardless of whether they’re in cyber or not, would benefit greatly from internalizing and executing those three things.
Discipline, for example, was critical during my early years of studying cybersecurity. I’d spend most evenings learning and practicing until 2 AM after a full day’s work. I’d take some nights off, but that intense focus and work helped me get up to speed and overcome my lack of IT/cybersecurity experience.
In the military, security is the mission. And everyone around you is very focused on achieving it. In the corporate world, the mission is usually profit or value; so security plays more of a supportive or additional role as opposed to being the ultimate objective.
Getting started! Finding resources on learning how to hack Loading Preview... Loading Preview... Loading Preview...
My wife was also incredibly encouraging while I concentrated on learning. She helped me persist even though she had no idea that my late-night sessions burning the candle at both ends would turn into the rewarding career it’s become. I’m extremely grateful for her support.
I have a guide on passing OSCP Loading Preview...
Before sitting the exam, I spent almost an entire year popping shells on Hack The Box and built up a skillset and methodology based on IppSec’s videos Loading Preview...
It was a memorable experience as I found Hack The Box’s lab environment more fun and friendlier than other lab platforms. The community was (and still is) eager to help, and the forums are still an effective resource for picking up extra tips and tricks.
A degree is proof of learning; not proof of experience. I joined the military straight out of school and brought my military intelligence experience to my cyber roles. If I were going to school these days, I’d definitely do a cyber degree, but 18 years ago, no one was teaching ethical hacking in universities. Times have changed, thankfully!
Checking incoming intelligence feeds for partner organizations and comparing that to our internal data.
Keeping up with open and closed-source reporting (a fancy way of saying “reading the news and private emails”).
Meetings with security vendors to discuss new threats they see and new features in their tools.
Authoring reports that inform businesses about emerging threats.
Start today, not tomorrow. If you’re starting from zero like I was, I’d suggest giving yourself roughly 18 months to learn all the material you need to know.
I built up my foundational knowledge through CompTIA’s Security+, but the HTB Academy Loading Preview...
I’d honestly recommend Hack The Box both for beginners and advanced users. I’m not being paid or compensated to say that, it’s just the fact that the practical tools and theoretical training help you get good quickly and develop a job-ready skillset.
If you’re looking to transition into cybersecurity from a military career, plan your exit early as possible - leaving the (UK) military can take a full year due to notice periods. Toning down or dropping the military persona will also help. This means learning to talk like a civilian and avoiding military language in your CV/resume.
It’s hard at first, but it’ll make the transition to civilian life much simpler. For those that struggle with the shift, my advice is to make friends with civilian people and get the hang of that culture as you're leaving the military.
Finally, as you set goals for the career you want to pursue, know that cybersecurity doesn’t just mean hacking or penetration testing Loading Preview...
Vulnerability management
Attack surface reduction
Governance risk and control
Security operations
Incident response
Forensic analysis
Auditing
Over 60 cybersecurity job opportunities Loading Preview...
Aspiring hackers can apply directly to roles posted by companies worldwide such as Amazon Web Services, NTT, Verizon, Daimler, DAZN, Context Information Security, and more.
At the same time, organizations can access a growing pool of talented individuals and discover their next ideal cybersecurity hire. Our new and revamped Talent Search helps recruiters find the perfect candidate more quickly and confidently than ever.
Author bio: Hassan Ud-deen (hassassin), Content Marketing Manager, Hack The Box Hassan Ud-deen is the Content Marketing Manager at Hack The Box. Combining thought leadership and SEO to fuel demand generation is his jam. Hassan's also fascinated by cybersecurity, enjoys interviewing tech professionals, and when the mood strikes him occasionally tinkers within a Linux terminal in a dark room with his (HTB) hoodie on. #noob. Feel free to connect with him on LinkedIn Loading Preview... |
Community
Blog Upcoming Events Meetups Affiliate Program SME Program Ambassador Program Parrot OSGet Help
Help Center Contact SupportCommunity
Blog Upcoming Events Meetups Affiliate Program SME Program Ambassador Program Parrot OSGet Help
Help Center Contact Support