Chris Haller loves capture the flag competitions (CTFs). The 抖阴视频 (UMGC) graduate, who received his B.S. in Computer Networks and Security in 2017 and M.S. in Cybersecurity Management and Policy in 2020, frequently enters these cybersecurity events where individuals compete in security-themed challenges for the purpose of obtaining the highest score.
鈥淭hey are a huge plus for my career,鈥 he said. 鈥淭hey allow me to hone my skills and they compel me to apply what I鈥檝e learned.鈥
Haller, the director of Professional Services at Centripetal Networks in Portsmouth, New Hampshire, added that cybersecurity competitions are one of the biggest things he looks for when he hires for his company. 鈥淐TFs can help bridge the experience gap for new grads trying to break into cyber,鈥 he said.
Haller鈥檚 passion for cybersecurity started young. Driven by his own curiosity, he was always interested in computers and video games. 鈥淚 was lucky enough to find a position with the Navy to provide formal training,鈥 he said.
Haller鈥檚 early enthusiasm for computers, combined with his professional experience in all things cyber, has paid off. He recently captured first-place in the National Cyber League Individual competition, a twice-a-year performance-based collegiate cybersecurity competition that draws more than 6,000 participants.
The National Cyber League, a mission-driven organization that focuses on preparing the next generation of cybersecurity professionals, is known in the competition world as offering some of the most challenging events. For Haller, the biggest challenge is time management and accuracy.
鈥淓ntrants are required to answer questions across a three-day period, so it requires a significant time investment,鈥 he said.
Haller鈥檚 competition experience has led to on-the-job success, as he and his team address some of the biggest challenges of the day, notably to proactively block advanced threats before they can damage networks.
鈥淎t Centripetal we鈥檝e found a way to do this by ingesting cyber threat intelligence, which tells us which IPs and domain names are malicious, and we stop it at the perimeter,鈥 he said. 鈥淏y stopping attacks at the reconnaissance stage, we prevent malicious attacks downstream.鈥
Haller believes more cybersecurity teams need to adopt this approach of blocking known malicious threats before they reach the perimeter. 鈥
Every organization that manages a security information and event management system (SIEM) can see millions of alerts every day about the attacks launched against their environment. There is simply no way for a human to review them all,鈥 he said. 鈥淏locking with intelligence about known malicious activity on the internet reduces the number of alerts in the SIEM to manageable levels, making it easier to investigate for malicious activity.鈥
With billions of threat alerts bombarding defense organizations every day, Haller believes that the industry should be more proactive in its approach鈥攗sing designated hit lists to block known bad actors from the web and free up time and energy to go after as-yet-unidentified threats.
When he鈥檚 not honing his skills in cyber competitions or researching nation-state bad actors damaging organizations around the world, Haller enjoys providing value to customers through professional services, such as penetration testing and incident response. Down the road, he hopes to give back.
鈥淚 would like to see myself in a teaching position as well, helping others understand the things I鈥檝e learned on how to protect networks from attacks,鈥 he said.
Share This