A short, edgy, bold mini-guide to being a security engineer. Learn to make it in a security team, develop a risk-oriented mindset, and discover the secrets of the industry.
"You're on the losing team, the team that makes the company waste money. On the other side is the winning team, the one that makes the company money."
Chapter 1: The Losing Team
15 chapters on the realities of security engineering
"You don't start on a complex project and try to give it a hug, instead you stab it in the heart."
Chapter 7: How to Get a Good Start
A threat model is a magical gift: it tells you what to do like it's the grown up in the room. It's the organizer in your life. It's the piece of paper that outlines what's important and what can wait.
You write a threat model to document your system, to identify what your attackers look like, what they can do, and to record what you've done to handle that. By doing this exercise, you'll identify single points of failure, dependencies that you blindly trust but you shouldn't, secrets and keys that are a bit too exposed.
Remember, the goal is to identify new work, pressing work. Be honest, be brutal, this is not a public relation piece.
You're not playing a fair game. As a member of the blue team (the team that defends) you need to secure everything, and the red team (the one that plays offense) just has to find something you overlooked to get in.
A chain is only as strong as its weakest link, and you're the investigator in charge of finding that link. So clean your snout and sniff the shit out of your turf. You're looking for truffles, you're looking for the smelly prize.
The last thing you want to do is put a nice and solid wall in some places, and leave completely-opened spots everywhere else. So raise the bar, across the board, just raise it a bit more. That's all you gotta do.
"Introduce yourself, like a slice of ham in a sandwich, in-between some of the already-mandatory steps that developers have learned to blindly obey."
Chapter 8: Forcing People to Do Things
"You're somewhat of a gardener, as you'll be slowly planting security seeds all around you. You're also an athlete, as you'll be most of the time swimming against current."
Chapter 14: This Is Your Life Now
A practical framework for efficient security engineering
Look at your system holistically to make sure you're not missing anything
Find the low hanging fruits from the attacker's point of view to prioritize
Find a way to get this done through relationships and convincing people
Drive your plan to completion, then go back to your threat model
"In the weather of your emotion it'll be cloudy, sunny, rainy, and snowing. So wear some flip flops but carry a big coat. You'll have zero clue what the expectations for your role are, and you'll end up wearing many hats."
Chapter 13: Who's With Me?
As you can't be everywhere, you'll have to rely on others to replicate your investigative efforts and report back. This can be hard as very few people are trained to think about security.
While you can't force people to do things, you can force ideas in their heads. You can mention security here and there, you can talk to them about what worries you, or what you think they should care about. They might sometimes seem like they're not listening, but it works.
"An idea is like a virus, resilient, highly contagious. The smallest seed of an idea can grow."
"You need credits. See them as coins that you can gain slowly by playing the right cards, and that you can lose in one hand. Without credibility, collaboration is impossible."
Chapter 7: How to Get a Good Start
You're the unsung hero. You're the dark knight.
Last updated: Oct 25, 2025