Activity
Mon
Wed
Fri
Sun
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
What is this?
Less
More

Memberships

BowTiedCyber Hoodies

3.6k members • Free

963 contributions to BowTiedCyber Hoodies
First Win!
Got my EC2 server up and running. Connected via SSH, installed Apache, opened port 80, and got the page live in the browser. Good to see it working properly!
First Win!
0 likes • 2h
👏🏻👏🏻👏🏻
Network+ Daily 🧠  
A network administrator observes that users experience slow file transfers during peak hours. Monitoring shows that the network link is consistently operating at maximum capacity. Which of the following is the MOST likely cause?
Poll
Cast your vote
0 likes • 3h
Answer: B. Bandwidth saturation Explanation: Bandwidth saturation occurs when the network link is fully utilized, causing slow data transfers and congestion during peak usage. High latency refers to delay, jitter affects real-time traffic consistency, and DNS delays impact name resolution rather than overall throughput.
Network+ Cheatsheet - Layer 6 
💡 OSI Series 💡 Layer 6 is where data becomes usable Before apps can read anything It has to be formatted, compressed, and secured Encryption happens here SSL/TLS operates here Miss this → you miss how data is actually protected
0
0
Network+ Cheatsheet - Layer 6 
(Remote) Threat Intelligence Analyst in NY!! | Pay: $35 - $60/hr.
About The Role We partner with the world's leading AI research teams and labs to build and train cutting-edge AI models — and we need experienced threat intelligence professionals to help us get it right. As a Threat Intelligence Analyst, you'll apply your real-world expertise in adversary tracking, campaign analysis, and CTI workflows to help train and evaluate AI systems that need to understand how cyber threats actually work. Your knowledge of what separates genuine attacker behavior from noise is exactly what frontier AI needs. - Organization: Alignerr - Type: Hourly Contract - Commitment: 10–40 hours/week What You'll Do - Analyze and classify threat reports, adversary campaigns, and attacker behavior across realistic scenarios - Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and consistency - Generate, structure, and validate threat intelligence data used to train and benchmark AI systems - Review AI-generated cybersecurity outputs and flag inaccuracies, gaps, or fabricated detail - Apply frameworks like MITRE ATT&CK to assess the quality and realism of AI reasoning about threats Who You Are - 2+ years of hands-on experience in threat intelligence, SOC operations, or security analysis - Familiar with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows - Able to distinguish real attacker behavior from synthetic, noisy, or fabricated data - Strong analytical and written communication skills — you can explain complex threat activity clearly - Self-directed and comfortable working asynchronously on task-based assignments Nice to Have - Experience writing threat intelligence reports or briefings - Familiarity with threat hunting, malware analysis, or incident response - Prior exposure to AI evaluation or data annotation workflows Apply today to make it count! Comment “JOB” and I’ll send you the link to apply!
0
0
Network+ Daily 🧠
A network administrator needs to configure DNS so that email sent to a domain is routed to the correct mail server. Which of the following DNS record types should be configured?
Poll
Cast your vote
0 likes • 1d
Answer: C. MX Explanation:MX (Mail Exchange) records specify the mail servers responsible for receiving email for a domain. A records map hostnames to IP addresses, CNAME creates aliases, and TXT records store text-based information such as verification data.
1-10 of 963
Airese Kaw
6
389points to level up
@airese-kaw-7159
BowTiedCyber

Active 2h ago
Joined Aug 25, 2025
Powered by