Hack Your Way Into A DoD Security Clearance

Presented at DerbyCon 2.0 Reunion (2012), Sept. 30, 2012, 10:30 a.m. (30 minutes).

A security clearance is essential if you want to work in the Federal IT, network security, or cyber security (drink!) space. You cannot submit for one as an individual, just like credit – gotta have it to get more. This presentation covers important information that you’ll need to know about the security clearance process, levels of clearance, and important details you’ll want to know before going through the process. The talk will cover different forms such as the SF86, questions that directly related to IT work, and some good war stories. While aimed at the DoD, the process is very similar at other Federal agencies.


Presenters:

  • Thomas Hoffecker
    Back for more at DerbyCon 2012, Thomas gave a presentation on PKI at the first DerbyCon. Several people didn’t like it and tried to stir up trouble for him at a new job but the information owner was not concerned even after being notified by those trying to stir up trouble. It all blew over and nothing became of it. He still works in the Northern Virginia area. No longer a Fed, he returned to the dark side as a binary mercenary (defense contractor) shortly after DerbyCon 2011. In his current job, he’s making sure that security is baked-in rather than bolted on later for a new campus network in the DC Metro area. Previously he worked for numerous DoD organizations including the Defense Logistics Agency (DLA), Army Network Operations & Security Center (NOSC), and 1st Information Operations Command’s Regional Computer Emergency Response Team (RCERT) Europe, DoD Education Activity (DoDEA), and multiple contractors supporting the DoD. In his spare time, he and his wife foster dogs for Maryland Westie Rescue

Similar Presentations: