What We Do
How we do it
Nov 22, 2021
Microsoft Exchange Vulnerability - CVE-2021-42321
THE THREAT eSentire has identified publicly available Proof-of-Concept (PoC) exploit code, for the critical Microsoft Exchange vulnerability CVE-2021-42321. CVE-2021-42321 was announced as part of Microsoft’s November Patch Tuesday release. Exploitation would allow a remote threat actor, with previous authentication, to execute code on vulnerable servers. Prior to the patch release, Microsoft…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Oct 28, 2021
Telarus and eSentire Expand Partnership to Safeguard Enterprises Globally Against Business Disrupting Ransomware and Zero-Day Attacks
London, UK and Sydney, Australia– Oct. 28, 2021 - eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), today announces the expansion of its partnership with Telarus, the largest privately-held distributor of business cloud infrastructure and contact centre services. Building on their mutual success across North America, Telarus will bring eSentire’s Managed…
Read More
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Apply today to partner with the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Dec 05, 2019

How I Went from Climbing Cable Poles to High-End Threat Hunting

Speak With A Security Expert Now

Originally posted in Cybersecurity Insiders November 26, 2019

My path to cybersecurity wasn’t a linear one. My first real job was installing DSL (digital subscriber lines) for phone companies. I was climbing poles, pulling cables and that sort of thing. Installing high-speed internet is what led me to IT, because customers would ask questions like “How do I do this on more than one computer?” or “What’s a network?” or “What’s Wi-Fi?” To answer their questions, I started digging in deeper and got turned onto the IT side of the business.

Eventually, I started doing junior admin work and worked my way up through the ranks at different companies before ending up in the role of IT director. I was hired to help a company owner transition from a break/fix retail shop into a managed services offering for businesses. I was responsible for developing and maturing the services offering, establishing technology partnerships, and improving the end user experience – while also delivering the services, too. I had no idea at the time that this opportunity would end up spurring my career in cybersecurity.

Getting further under the hood with DevOps, security and cloud

As I became more responsible for service offerings and environments at that company, I started looking at all of the things that were going on in the industry. The three big things that stood out to me at the time were DevOps, security and cloud. The owner was really gung-ho about the cloud, but it seemed to me that we should be focusing more on securing these environments before putting all of our customers’ stuff in the cloud. And that jumpstarted my interest in security.

Once I got bit by the cybersecurity bug, I really dove in and started reading everything I could find. I started getting certifications and education in cybersecurity. The more I learned, the more interested I became – it resonated and felt like “This is how my mind works.”

Now, of course I’m not a criminal, but I’m very good at finding loopholes and developing ways to exploit them. It’s important to understand how things can be broken and infiltrated. It’s not criminal if it’s ethical – I’ve got a white hat. But if somebody can build it, somebody can break it; that’s how I look at things.

Security felt like my calling. It requires being able to think outside the box. And you’ve got to keep learning and adapt. You can’t just confine yourself to what’s the norm, what’s the standard, because as we know, the industry evolves every day and you have to be able to keep up with it.

Transitioning to security

At first when I started interviewing for security jobs, there was a tendency to push me towards pre-sales and consulting. That wasn’t what I wanted. I wanted to be technical and hands-on. I wanted to deploy things. But I did end up in pre-sales for a while, which helped me understand the other side of the sales cycle.

Eventually, a recruiter contacted me and told me I would be a great fit for eSentire, a managed detection and response (MDR) company. I didn’t even know what that was. I normally ignore recruiters, but I was intrigued by this opportunity so I continued to explore. The more I read up on MDR, the more I realized that this is where the industry’s going. I thought, “Holy cow – this is what I’m missing.” I don’t like to do what everybody is doing right now; I like to do what everybody is going to be doing in the future. eSentire’s MDR approach really interested me – it was exciting then, and I’m still excited.

A world of possibilities

Cybersecurity is a deep and multifaceted field with all sorts of opportunities and ways to get involved. It’s exciting to see the push to bring more women into the field, and I help with mentoring and attend meet-ups as my busy schedule allows. If you have a real interest, it doesn’t matter where you start from. I started out installing cable! There’s never been a better time to jump into this field; the need is huge, and there will be plenty of people and programs to help you along your own particular path.

About the author

As vice president, global sales engineering at eSentire, Tia Hopkins is focused on leading the team in providing pre-sales engineering support. She has held various technology roles, including Senior Solutions Architect and Director of IT Services at services organizations. She is an adjunct Professor for Yeshiva University’s Cybersecurity Masters program, and a Career Mentor for Cybrary and Built by Girls.

Tia is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (C|EH) and Certified Hacking Forensics Investigator (C|HFI). She also holds a BS in Information Technology, MS in Information Security and Assurance and MS in Cybersecurity and Information Assurance, and plans to continue her education in pursuit of an MBA in IT Management.

View Most Recent Blogs
Tia Hopkins
Tia Hopkins Vice President, Global Sales Engineering