Listen "S10 E2 The Secrets of Linkedin's Algorithm"
Episode Synopsis
David is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from Teaching to Virus Removal. David is passionate about Cybersecurity and enjoys using his platform to teach people how to protect themselves and stay safe online.
00:00 Introduction
00:17 Our Guest
01:12 Using LinkedIn to break into Cybersecurity
07:30 Fake Profiles on Linkedin
08:30 Having a complete profile
10:19 the LinkedIn Algorithm
14:20 Useful Certifications and Resources
26:39 Davids Book about Women in Cyber
32:28 SOC fatigue
36:27 What role does Automation has?
37:46 Will Automation replace a SOC Analyst?
39:30 How can Clients improve their Cybersecurity?
42:35 Risk Assessments: Who should be leading?
45:20 Connecting with David
----------------------------------------------------------------------
To learn more about David visit https://www.linkedin.com/in/david-meece-cybertech-dave/
To learn more about Dark Rhino Security at https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on social media, where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
https://securityplus.training/
00:00 Introduction
00:17 Our Guest
01:12 Using LinkedIn to break into Cybersecurity
07:30 Fake Profiles on Linkedin
08:30 Having a complete profile
10:19 the LinkedIn Algorithm
14:20 Useful Certifications and Resources
26:39 Davids Book about Women in Cyber
32:28 SOC fatigue
36:27 What role does Automation has?
37:46 Will Automation replace a SOC Analyst?
39:30 How can Clients improve their Cybersecurity?
42:35 Risk Assessments: Who should be leading?
45:20 Connecting with David
----------------------------------------------------------------------
To learn more about David visit https://www.linkedin.com/in/david-meece-cybertech-dave/
To learn more about Dark Rhino Security at https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on social media, where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
https://securityplus.training/
More episodes of the podcast Security Confidential
S18 E02 (VIDEO) Hackers are using ChatGPT
04/12/2025
S18 E02 Hackers are using ChatGPT
04/12/2025
S18 E01 How Hackers Target National Security
06/11/2025
S18 E0 (VIDEO) Data Poisoning
09/10/2025
S18 E0 Data Poisoning
08/10/2025
S17 E09 (VIDEO) The Hacker's Playbook
11/08/2025
S17 E09 The Hacker’s Playbook
06/08/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.