<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Careers and Training on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/categories/careers-and-training/</link><description>Recent content in Careers and Training on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 08 Apr 2026 08:00:00 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/categories/careers-and-training/index.xml" rel="self" type="application/rss+xml"/><item><title>Cyber Defense Exercises: 40 Teams, 15 Countries</title><link>https://bsg.tech/blog/building-realistic-cyber-defense-exercise-lessons/</link><pubDate>Wed, 08 Apr 2026 08:00:00 +0000</pubDate><guid>https://bsg.tech/blog/building-realistic-cyber-defense-exercise-lessons/</guid><description>&lt;p&gt;Most organizations test their defenses with tabletop exercises — facilitated discussions where someone reads a scenario and teams talk through their response. Tabletops test process. They don&amp;rsquo;t test capability.&lt;/p&gt;
&lt;p&gt;BSG has spent over a decade on the offensive side — &lt;a href="https://bsg.tech/penetration-testing/"&gt;penetration testing&lt;/a&gt;, red teaming, and running CTF competitions at security conferences across Europe. A few years ago, we &lt;a href="https://bsg.tech/blog/bsg-won-sans-netwars-tournament/"&gt;won SANS Grid NetWars&lt;/a&gt;, a defensive investigation tournament, and something clicked: the same skills that make a good attacker make a good exercise designer. We know how real adversaries operate because that&amp;rsquo;s what we do every day. Building realistic exercises for blue teams was a natural next step.&lt;/p&gt;</description></item><item><title>From Developer to AppSec Engineer: Career Path Guide</title><link>https://bsg.tech/blog/developer-to-appsec-engineer-career-path/</link><pubDate>Thu, 05 Feb 2026 23:02:15 +0000</pubDate><guid>https://bsg.tech/blog/developer-to-appsec-engineer-career-path/</guid><description>&lt;p&gt;You spend your days building software. You understand how systems are architected, how data flows between components, and how features go from a pull request to production. Now consider this: that same knowledge makes you one of the strongest candidates for a career in application security.&lt;/p&gt;</description></item><item><title>Cybersecurity Professional Standards</title><link>https://bsg.tech/blog/cybersecurity-professional-standards/</link><pubDate>Tue, 29 Jul 2025 13:41:52 +0000</pubDate><guid>https://bsg.tech/blog/cybersecurity-professional-standards/</guid><description>&lt;p&gt;The latest &lt;strong&gt;&lt;a href="https://open.spotify.com/episode/6AAdwUbHx3EZBBuqoSEe0M"&gt;NCSC Cyber Series&lt;/a&gt;&lt;/strong&gt; podcast gathers three voices who know the battlefield from different angles:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Tracey Jones, Senior Analyst at the Bank of England; Gian Andrea Padovani, Senior Manager in the PRA’s Cyber-Resilience team; and Chris Ensor, Deputy Director for Cyber Growth at the NCSC&lt;/em&gt;. Their discussion turns a spotlight on an issue that rarely makes headlines yet shapes every breach report we read: professional standards.&lt;/p&gt;</description></item><item><title>Security Awareness Training: Does It Actually Work?</title><link>https://bsg.tech/blog/the-truth-about-phishing-training-why-its-not-as-effective-as-you-think/</link><pubDate>Mon, 25 Nov 2024 16:48:56 +0000</pubDate><guid>https://bsg.tech/blog/the-truth-about-phishing-training-why-its-not-as-effective-as-you-think/</guid><description>&lt;p&gt;Phishing attacks remain the top cybersecurity threat globally, accounting for 33% of data breaches in small and medium businesses according to Verizon’s 2025 Data Breach Investigation Report. Despite investing heavily in employee training programs, organizations often find themselves repeatedly compromised. This raises a critical question: How effective are these phishing training programs in preventing real-world attacks?&lt;/p&gt;</description></item><item><title>How to write a CV in cybersecurity</title><link>https://bsg.tech/blog/how-to-write-a-cv-in-cybersecurity/</link><pubDate>Thu, 28 May 2020 10:11:25 +0000</pubDate><guid>https://bsg.tech/blog/how-to-write-a-cv-in-cybersecurity/</guid><description>&lt;p&gt;Each time after hosting a &lt;a href="https://nonamecon.org"&gt;Nonamecon&lt;/a&gt; or &lt;a href="https://owasp.org/www-chapter-kyiv/"&gt;OWASP Kyiv&lt;/a&gt; event, my mailbox is flooded by messages from people asking if we have job openings. How can one join our company? Here is my CV! And after getting a response, they ask how they can improve it.&lt;/p&gt;</description></item></channel></rss>