-
Notifications
You must be signed in to change notification settings - Fork 15
docs: add summary for OTC CatchUp #269 : added config #324
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,15 @@ | ||
| ==== Attendees | ||
|
|
||
| . link:https://twitter.com/KartikSoneji_[Kartik Soneji^] | ||
| . link:https://x.com/Alpastx[Alpesh Bhagwatkar^] | ||
| . Chintan Gurjar | ||
| . link:https://twitter.com/chiragnayyar[Chirag Nayyar^] | ||
| . link:https://twitter.com/furtado_jaden[Jaden Furtado^] | ||
| . link:https://twitter.com/harshgkapadia[Harsh Kapadia^] | ||
| . link:https://twitter.com/SirusTweets[Darshan Rander^] | ||
| . link:https://twitter.com/bhavesh878789[Bhavesh Kukreja^] | ||
| . Ayush Shukla | ||
| . Janvi Matani | ||
| . Rehan S. | ||
| . Shlok Bagwe | ||
| . Shubhranil Paul | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1 @@ | ||
| catchup_config_noimage=1 |
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -0,0 +1,25 @@ | ||||||
| Date: 03-01-2026 | ||||||
|
|
||||||
| Duration: 2 hrs 15 mins | ||||||
|
|
||||||
| ==== Topics Discussed | ||||||
|
|
||||||
| * Chintan Gurjar shared insights about cybersecurity certifications and their role in the industry. | ||||||
| ** He discussed the difference between certifications in coding versus cybersecurity, noting that unlike coding fields like Java where there aren't world-wide recognized certifications, cybersecurity has established certification programs. | ||||||
| ** Chintan explained why certifications matter in cybersecurity, especially for consulting companies. | ||||||
| *** He shared his personal experience: during his first 5 years, he didn't believe in certifications and didn't have any. | ||||||
| *** When he landed his 3rd job at KPMG New Zealand, his boss explained the value of certifications from a business perspective. | ||||||
|
Comment on lines
+10
to
+11
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
Maybe this is not needed ? |
||||||
| ** Chintan explained how certifications are used in project proposals and client acquisition. | ||||||
| *** When competing for projects, consulting firms (including Big 4 companies) showcase their team's credentials. | ||||||
| *** Companies highlight how many OSCP-certified or CEH-certified professionals they have to demonstrate expertise to potential clients. | ||||||
| *** This portfolio of certifications helps firms win projects, which is why companies are often willing to pay for employee certifications. | ||||||
| ** The discussion covered differences in interview processes between coding and cybersecurity roles. | ||||||
| *** For coding positions, companies typically give coding tasks (like LeetCode problems) where they can observe thought process, methodology, and coding skills directly. | ||||||
| *** In cybersecurity, the interview process is more complex due to multiple sub-domains (VAPT, GRC, Threat Detection Engineering, etc.). | ||||||
| *** For VAPT roles, setting up vulnerable infrastructure for technical interviews requires significant maintenance and management overhead. | ||||||
| *** For GRC roles, there's often no technical component to assess, making it harder to evaluate candidates. | ||||||
|
Comment on lines
+18
to
+20
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Write Write like this for GRC and other abbreviations too which are not so generic or if they are domain specific. |
||||||
| *** For specialized roles like Threat Detection Engineering, setting up interview infrastructure would be prohibitively expensive and complex. | ||||||
| ** Chintan emphasized that certifications should be viewed as a tiebreaker, not the primary hiring criterion. | ||||||
| *** The hiring process should start with resume-based analysis of 6-7 candidates, followed by interviews. | ||||||
| *** If multiple candidates perform equally well, certifications can serve as a differentiator. | ||||||
| ** Key takeaway: The main goal should be to learn cybersecurity; certifications should act as proof of knowledge, not the primary learning objective. | ||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Alphabetical order