A Day in the Life of an Ethical Hacker Podcast Series: Interview with Özgür Alp, Synack Red Team Member



Hosted by Thys Harrison, EMEA Sales Development Team Lead

The Synack Red Team (SRT) gives the most talented security researchers across the globe a platform to do what they love and get paid for it. A private network of highly-curated and vetted security researchers, the SRT is challenged every day to deliver exploitation discovery and management for some of the biggest brands in the world. On the Synack platform, researchers have access to the industry’s first ever hacker toolkit built at enterprise scale, to make them more efficient and effective at uncovering critical vulnerabilities that matter.

These ethical hackers are increasingly being recognised as an important way for businesses to unearth security weaknesses before they can be exploited by online criminals.

In this Podcast, Synack Red Team member, Özgür Alp joins Synack’s Thys Harrison for an open conversation on what a day in the life of an ethical hacker is all about. He’ll discuss:
  • Why he has chosen ethical hacking as his full time job.
  • What he enjoys most and finds the most challenging about the work.
  • And why he believes this is the best job in the world.
Özgür Alp is an experienced offensive cyber security specialist, lecturer and instructor. In his first job as a consultant at Deloitte Turkey, he participated as technical lead and second level customer relations management responsible for the cyber security operations team. During this time he was involved with 200+ different on-field and remote security projects for multinational and domestic companies in various industries. After his time at Deloitte, Özgür began working independently as a bug bounty hunter & on-demand offensive security consultant and has reported over 1000 critical, high, and medium level vulnerabilities. Correspondingly, Özgür has started giving lectures part-time at two prestigious universities in Istanbul on the subjects of Introduction to Cyber Security and Web Application Hacking." He has been working with Synack for 3 years.