Artwork

Content provided by LegitimateCybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by LegitimateCybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity

41:32
 
Share
 

Manage episode 507888134 series 3673385
Content provided by LegitimateCybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by LegitimateCybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory.

In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependency hell, to Dustin’s Coast Guard days that led him into DoD cyber operations and battlefield coding.

What you’ll hear:

Frank’s unexpected pivot from English major → Arabic → US Intelligence → Packet Hunters → ISACA → vCISO

Dustin’s childhood obsession with modems, Prodigy, and “Hackers” → DoD cyber ops → Iraq deployment software award → BlueVoyant leadership

Why Wireshark still matters more than ever in an encrypted world

The three inflection points that changed Frank’s career forever

Why frameworks (NIST, ISO, HITRUST) keep failing—and Dustin’s PhD research into the human factor of security

What we focus on today: AI, vCISO work, penetration testing, and the balance of family + cyber

🎯 If you’re looking for career inspiration, real stories, and unfiltered lessons from two practitioners who’ve done the work—this episode is for you.

Timestamps below.

📩 Questions? [email protected]

💬 Drop a comment—we reply fast.

🔔 Subscribe for more real-world cybersecurity with humor and honesty.

Chapter Breaks

00:00 Cold Open – “Why should you listen to us? You shouldn’t.”

00:19 Meet your hosts: Dustin & Frank

00:36 Why this episode: career steps & credibility check

01:23 Setting the stage: our backgrounds in cyber

02:06 Frank’s accidental entry into cybersecurity (post-9/11, US Intelligence)

03:26 The language grind: Arabic immersion & Spanish surprises

05:24 From Nordstrom suits to DoD analyst (wrong master’s degree first!)

07:15 Building real skills, Packet Hunters, and ISACA transition

07:40 Discovering Wireshark: packets as puzzles with real-world impact

09:02 Wi-Fi experiments, streaming flex, and home internet humility

09:48 Frank’s advice: explore cyber early—or you’ll be miserable

10:19 Dustin’s story begins: Palm Bay, Florida + engineering neighbors

11:14 Simpsons saxophone teacher → first coding mentor

12:32 AOL for DOS, Prodigy, CompuServe → modem obsession

13:26 Networking excitement & “Hackers” movie inspiration

14:23 Linux from scratch & dependency hell at age 15

15:17 School vs passion: community college frustrations → military track

16:25 Coast Guard IT school → voluntold to Fort Meade (DoD cyber ops)

18:03 Ground-up learning → teaching others by doing

19:13 Linux from scratch = trial by fire learning

19:51 Wireshark packet analysis as the foundation skill

21:02 Policy + frameworks: the cowboy days before NIST awareness

22:43 Frank’s 3 inflection points: contracting leap, Packet Hunters, discovering NIST

25:50 Dustin’s inflection points: first root login, Project Phalanx, Iraq software success

27:54 Building impactful systems → Army Achievement Medal for battlefield code

29:27 Perspective: cyber ops under fire → calm in the private sector

30:22 Frank now: family focus, vCISO variety, and AI’s cultural impacts

34:14 Tech culture & identity: from iPods to Meta glasses

34:53 Dustin now: pen testing, vuln mgmt, and a PhD on framework adoption

37:42 Why frameworks keep failing: the human layer

39:31 Rethinking cybersecurity like medicine, not just militaristic defense

40:15 How to reach us & engage with the show

41:04 Sign-off

#cybersecurity #careerstories #packets #wireshark #linux #dod #usintelligence #techcareers #careeradvice #pentesting #vCISO #humanfactors #ai #frameworks

  continue reading

17 episodes

Artwork
iconShare
 
Manage episode 507888134 series 3673385
Content provided by LegitimateCybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by LegitimateCybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory.

In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependency hell, to Dustin’s Coast Guard days that led him into DoD cyber operations and battlefield coding.

What you’ll hear:

Frank’s unexpected pivot from English major → Arabic → US Intelligence → Packet Hunters → ISACA → vCISO

Dustin’s childhood obsession with modems, Prodigy, and “Hackers” → DoD cyber ops → Iraq deployment software award → BlueVoyant leadership

Why Wireshark still matters more than ever in an encrypted world

The three inflection points that changed Frank’s career forever

Why frameworks (NIST, ISO, HITRUST) keep failing—and Dustin’s PhD research into the human factor of security

What we focus on today: AI, vCISO work, penetration testing, and the balance of family + cyber

🎯 If you’re looking for career inspiration, real stories, and unfiltered lessons from two practitioners who’ve done the work—this episode is for you.

Timestamps below.

📩 Questions? [email protected]

💬 Drop a comment—we reply fast.

🔔 Subscribe for more real-world cybersecurity with humor and honesty.

Chapter Breaks

00:00 Cold Open – “Why should you listen to us? You shouldn’t.”

00:19 Meet your hosts: Dustin & Frank

00:36 Why this episode: career steps & credibility check

01:23 Setting the stage: our backgrounds in cyber

02:06 Frank’s accidental entry into cybersecurity (post-9/11, US Intelligence)

03:26 The language grind: Arabic immersion & Spanish surprises

05:24 From Nordstrom suits to DoD analyst (wrong master’s degree first!)

07:15 Building real skills, Packet Hunters, and ISACA transition

07:40 Discovering Wireshark: packets as puzzles with real-world impact

09:02 Wi-Fi experiments, streaming flex, and home internet humility

09:48 Frank’s advice: explore cyber early—or you’ll be miserable

10:19 Dustin’s story begins: Palm Bay, Florida + engineering neighbors

11:14 Simpsons saxophone teacher → first coding mentor

12:32 AOL for DOS, Prodigy, CompuServe → modem obsession

13:26 Networking excitement & “Hackers” movie inspiration

14:23 Linux from scratch & dependency hell at age 15

15:17 School vs passion: community college frustrations → military track

16:25 Coast Guard IT school → voluntold to Fort Meade (DoD cyber ops)

18:03 Ground-up learning → teaching others by doing

19:13 Linux from scratch = trial by fire learning

19:51 Wireshark packet analysis as the foundation skill

21:02 Policy + frameworks: the cowboy days before NIST awareness

22:43 Frank’s 3 inflection points: contracting leap, Packet Hunters, discovering NIST

25:50 Dustin’s inflection points: first root login, Project Phalanx, Iraq software success

27:54 Building impactful systems → Army Achievement Medal for battlefield code

29:27 Perspective: cyber ops under fire → calm in the private sector

30:22 Frank now: family focus, vCISO variety, and AI’s cultural impacts

34:14 Tech culture & identity: from iPods to Meta glasses

34:53 Dustin now: pen testing, vuln mgmt, and a PhD on framework adoption

37:42 Why frameworks keep failing: the human layer

39:31 Rethinking cybersecurity like medicine, not just militaristic defense

40:15 How to reach us & engage with the show

41:04 Sign-off

#cybersecurity #careerstories #packets #wireshark #linux #dod #usintelligence #techcareers #careeradvice #pentesting #vCISO #humanfactors #ai #frameworks

  continue reading

17 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play