The Journey from Network Security Engineer to Podcast Host – Jack Rhysider – PSW #702 | SC Media
Security research

The Journey from Network Security Engineer to Podcast Host – Jack Rhysider – PSW #702

July 16, 2021

In this segment of Paul’s Security Weekly, Paul and crew interview Jack Rhysider about how he got his start in Information Security, the projects and careers he worked on over the years, and how he transitioned from a Network Security Engineer to the host of Darknet Diaries Podcast.

Segment Resources: Visit for all the latest episodes!

Full Episode Show Notes

The Journey from Network Security Engineer to Podcast Host


Jack Rhysider

Jack Rhysider - Podcaster at Darknet Diaries


Worked as a network security engineer for 10 years for a MSSP. Admin of firewalls, IPS units, SIEMs. Got burnt out, loved podcasts, wanted to hear a podcast about hacker stories. Started the podcast Darknet Diaries. Quit job 6 months later, focused on podcast full time. Now podcast make a full time income.


Jeff Man

Jeff Man - #HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems


Cryptanalyst, infosec analyst, pioneering ex-NSA pen tester, PCI specialist and certified security curmudgeon. Currently a Sr. InfoSec Consultant for Online Business Systems.

Lee Neely

Lee Neely - Senior Cyber Analyst at Lawrence Livermore National Laboratory


Lee Neely is a senior IT and security professional at Lawrence Livermore National Laboratory (LLNL) with over 25 years of experience. He has been involved in many aspects of IT from system integration and quality testing to system and security architecture since 1986. He has had extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. Lee has worked with securing information systems since he installed his first firewall in 1989.

Paul Asadoorian

Paul Asadoorian - Founder at Security Weekly


Paul Asadoorian is the founder of Security Weekly, which was acquired by CyberRisk Alliance. Paul spent time “in the trenches” implementing security programs for a lottery company and then a large university. Paul is offensive, having spent several years as a penetration tester. As Product Evangelist for Tenable Network Security, Paul built a library of materials on the topic of vulnerability management. When not hacking together embedded systems (or just plain hacking them) or coding silly projects in Python, Paul can be found researching his next set of headphones.


prestitial ad