Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Josh Mason & Wade Wells and Simply Cyber Media Group. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Josh Mason & Wade Wells and Simply Cyber Media Group or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

From Pre-Law to FLARE: How Josh Stroschein Became Google's Malware Analyst

39:38
 
Share
 

Manage episode 522125500 series 3604599
Content provided by Josh Mason & Wade Wells and Simply Cyber Media Group. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Josh Mason & Wade Wells and Simply Cyber Media Group or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein β€” aka The Cyber Yeti β€” a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world.

Josh shares his unconventional path through .NET development, credit card processing security, and academia before landing at Google. He opens up about teaching reverse engineering while learning it himself, building educational CTFs, and the realities of making it as a full-time reverse engineer in an industry where those roles are rare.

What you'll hear:

πŸ”Ή From pre-law to pilot training to PhD in cybersecurity

πŸ”Ή How teaching RE forced him to truly master it

πŸ”Ή Life inside Google's FLARE team (via Chronicle β†’ Mandiant)

πŸ”Ή Flareon CTF β€” the RE challenge that's run for 12 years

πŸ”Ή A wild Black Hat NOC story involving an infected Mac and Atomic Stealer

πŸ”Ή Using AI to build malware samples for training labs

πŸ”Ή Why going low-level is the best advice for blue teamers

Chapters:

00:00 Introduction and Welcome

00:50 Josh's Connection to Dr. Gerald Auger

02:00 The Non-Traditional Path: Pre-Law, Pilot Training & .NET Dev

05:00 Getting Into Security at a Credit Card Processor

07:00 Teaching Reverse Engineering at Dakota State

10:00 Flareon CTF and Educational CTF Design

14:00 Is Reverse Engineering Offensive or Defensive?

17:00 How Rare Are Full-Time RE Roles?

21:00 The Path to Google: Chronicle, Mandiant & FLARE

25:00 Learning Through Teaching and YouTube Content

28:00 Black Hat NOC Story: Catching Atomic Stealer Live

33:00 Using AI to Create Malware Training Samples

37:00 Building a Defang Tool (and .NET Nightmares)

40:00 Advice for Blue Teamers: Go Low-Level

🎧 Find Josh Stroschein:

β†’ Website: https://www.thecyberyeti.com

β†’ YouTube: The Cyber Yeti

β†’ Podcast: The Cyber Yeti Podcast

πŸ‘₯ Connect with the Hosts:
β†’ Josh Mason: https://www.linkedin.com/in/joshuacmason/
β†’ Wade Wells: https://www.linkedin.com/in/wadingthrulogs/
β†’ Swimlane: https://www.linkedin.com/company/swimlane

πŸŽ™οΈ Listen on Your Favorite Platform:
β†’ Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4
β†’ Apple Podcasts: https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182
β†’ Full Playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4

πŸ‘ If you enjoyed this episode, don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.

=========================
All the ways to connect with Simply Cyber
https://SimplyCyber.io/Socials
=========================
This podcast is presented by Simply Cyber Media Group

  continue reading

40 episodes

Artwork
iconShare
 
Manage episode 522125500 series 3604599
Content provided by Josh Mason & Wade Wells and Simply Cyber Media Group. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Josh Mason & Wade Wells and Simply Cyber Media Group or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein β€” aka The Cyber Yeti β€” a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world.

Josh shares his unconventional path through .NET development, credit card processing security, and academia before landing at Google. He opens up about teaching reverse engineering while learning it himself, building educational CTFs, and the realities of making it as a full-time reverse engineer in an industry where those roles are rare.

What you'll hear:

πŸ”Ή From pre-law to pilot training to PhD in cybersecurity

πŸ”Ή How teaching RE forced him to truly master it

πŸ”Ή Life inside Google's FLARE team (via Chronicle β†’ Mandiant)

πŸ”Ή Flareon CTF β€” the RE challenge that's run for 12 years

πŸ”Ή A wild Black Hat NOC story involving an infected Mac and Atomic Stealer

πŸ”Ή Using AI to build malware samples for training labs

πŸ”Ή Why going low-level is the best advice for blue teamers

Chapters:

00:00 Introduction and Welcome

00:50 Josh's Connection to Dr. Gerald Auger

02:00 The Non-Traditional Path: Pre-Law, Pilot Training & .NET Dev

05:00 Getting Into Security at a Credit Card Processor

07:00 Teaching Reverse Engineering at Dakota State

10:00 Flareon CTF and Educational CTF Design

14:00 Is Reverse Engineering Offensive or Defensive?

17:00 How Rare Are Full-Time RE Roles?

21:00 The Path to Google: Chronicle, Mandiant & FLARE

25:00 Learning Through Teaching and YouTube Content

28:00 Black Hat NOC Story: Catching Atomic Stealer Live

33:00 Using AI to Create Malware Training Samples

37:00 Building a Defang Tool (and .NET Nightmares)

40:00 Advice for Blue Teamers: Go Low-Level

🎧 Find Josh Stroschein:

β†’ Website: https://www.thecyberyeti.com

β†’ YouTube: The Cyber Yeti

β†’ Podcast: The Cyber Yeti Podcast

πŸ‘₯ Connect with the Hosts:
β†’ Josh Mason: https://www.linkedin.com/in/joshuacmason/
β†’ Wade Wells: https://www.linkedin.com/in/wadingthrulogs/
β†’ Swimlane: https://www.linkedin.com/company/swimlane

πŸŽ™οΈ Listen on Your Favorite Platform:
β†’ Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4
β†’ Apple Podcasts: https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182
β†’ Full Playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4

πŸ‘ If you enjoyed this episode, don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.

=========================
All the ways to connect with Simply Cyber
https://SimplyCyber.io/Socials
=========================
This podcast is presented by Simply Cyber Media Group

  continue reading

40 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play