Volunteer @ BGH Foundation

Black Girls Hack Foundation (BGH Foundation) is a non-profit organization that is dedicated to increasing diversity in Cybersecurity. We hope to accomplish this by

  • Increasing Representation – BGH Foundation’s goal is to increase diversity and representation in the Cyber field. We believe that representation matters and we hope to help increase representation by portraying Black women in Cyber.
    • #FeatureFridays of Black Women in Cyber through our social media campaign
  • Mentoring – BGH Foundation believes that in addition to having the skills, and training to join the cyber field that they need to know what to expect. BGH Foundation is creating a mentoring program to help connect aspiring Cybersecurity professionals to mentors in the field.
    • #CyberMentoringMonday social media campaign
    • Mentoring programs
  • Resume review – BGH Foundation is helping aspiring Cybersecurity professionals to get into the field by helping them structure their resumes and represent themselves in the best way to get past the Applicant Tracking Systems and in front of a hiring manager.
  • Educational training programs – BGH Foundation believes that there is a high entry level cost to obtaining certification training in the cybersecurity field. To help reduce the overhead associated with getting training for cyber certifications, BGH Foundation is offering free study groups to help get aspiring Cybersecurity professionals ready for industry certifications.
    • CEH Study Group
    • Security+ Study Group

  • Friday Night Labs – BGH Foundation wants to continue to operate the Friday Night Labs program so that it’s members can get hands on lab experience.
  • BGH Cloud Labs (Virtualization Program ) One of the barriers for entry for cybersecurity professionals is not being able to create a home lab or a virtual lab due to the high costs of operating in the cloud and the resource intensiveness of home lab virtualization setups. To help reduce the barriers to entry into Cyber BGH Foundation is creating BGH Cloud Labs a program to help create a cloud lab that will allow students to participate in lab exercises that will provide them with hands on skills to help aid their entry into cybersecurity.
  • Board and Executive Leadership – BGH Foundation has 5 vacant Board seats and several open executive leadership positions. Positions require submission of a resume, Non Disclosure Agreement, a minimum 1 year commitment and approval by the existing Board of Directors.
  • Volunteer Coordinator – BGH has several volunteer positions and a lot of expressed interest for volunteers so it would be great if you’ve got experience or an interest in doing this.

***All Volunteers (except mentors) will be requested to complete a Non Disclosure Agreement.***

« View all Sign-up Sheets

Mentoring

Event Chair: Tennisha Martin

DETAILS:

BGH Foundation believes that in addition to having the skills, and training to join the cyber field that they need to know what to expect. BGH Foundation is creating a mentoring program to help connect aspiring Cybersecurity professionals to mentors in the field.

Mentoring Program Coordination

Responsible for helping to match mentors to mentees

Available Spots
Filled
Mentors

Red Team
Blue Team
Purple Team
Cryptography
Malware Analysis
Incident Response
Reverse Engineering
Secure Development
Cybersecurity Sales
Cybersecurity Law
General

Available Spots Item Details Item Qty
#1: Filled Blue Team and Purple Team 4
#5: Filled Cyber Risk Management and Cyber Law 2
#7: Filled Pentesting/Ethical Hacking 1
#8: Filled General, Cryptography, Secure Development 4
#12: Filled DFIR, Threat Intel, Detection, Public Speaking, Leadership & Strategy, 1
#13: Filled Offensive Operational Security for software 1
#14: Filled Blue Team, Vulnerability Management, Architecture, Logs, Logs, Logs 1
#15: Filled Cybersecurity Governance, Risk, Compliance and Assurance 1
#16: Filled C- All of the above. I've worked in network security, cybersecurity analyst, DFIR, and pentesting roles, along with executive management. 7
#23: Filled Safety and Security Critical Computing 1
#24: Filled Incident Response 1
#25: Filled Messaging Security (spam, phishing etc.) 1
#26: Filled Vulnerability Management 1
#27: Filled Incident Response, cryptography, AWS 1
#28: Filled general; public policy; national security; research and scholarship; economics and social science of infosec; 1
#29: Filled Threat Intelligence, SOC, Penetration Testing 1
#30: Filled Threat Intellience, Forensics 1
#31: Filled Penetration Testing, Ethical Hacking, Bug Bounty, Software Engineering, Security Research 1
#32: Filled Pentesting/Ethical Hacking, Reverse Engineering, Security Research, Malware Analysis, Leadership & Strategy, Executive Management 1
#33: Filled security research, exploitation, reverse engineering, web application hacking, pentesting, red teaming, education (lectured at UNSW in Sydney for ~9 years) 1
#34: Filled Blue Team, Secure Development (specifically network situational awareness and development of tools and systems for security monitoring and incident analysis) 1
#35: Filled Career transition, SOC, human networking, self-branding, OSINT, general InfoSec 1
#36: Filled General Topics, Reverse Engineering, Vulnerability Research, Secure Development, CTF tournaments, some applied cryptography and web security 1
#37: Filled Blue Team (Threat Hunting, Forensics, Incident Response, Detection Engineering), intro Penetration Testing, intro Application Security 1
#38: Filled Vulnerability Management, threat, general 1
#39: Filled Blue team 14
#53: Filled IoT 2
#55: Filled Red Team 1
#56: Filled Information systems 3
#59: Filled Application Security 1
#60: Filled Product and application security, secure development, security engineering management 3
#63: Filled undecided 23
#86: Filled Product and IOT security, Security Engineering, EPP and EDR, Risk Management. 1
#87: Filled Product Security, Blue Team, Red Team 1
#88: Filled Malware Analysis, Reverse Engineering, Secure Development, General (C, assembly, python, ghidra, IDA, iOS/macOS internals, vulnerability research, exploit development) 1
#89: Filled 1
#90: Filled 2
#92: Filled Global Support, BlueTeam 1
#93: Filled 1
#94: Filled Red Team, Pentesting, Security Research, Strategy, Threat Hunting, Incident Response 2
#96: Filled Threat Intelligence, Cyber Crime (for-profit) 1
#97: Filled General, SOC, Pentesting 1
#98: Filled I've ran Threat Intelligence teams, DFIR teams, SOC/Hunt teams, leadership mentoring and Product 2
#100: Filled 1
#101: Filled I am looking for a mentor in red team, pentesting and ethical hacking, and incident response 94
#195: Filled General. Cloud Security. Threat Hunting. incident Response. Purple Team. Email Security. 1
#196: Filled Undecided 1
#197: Filled Blue Team (Threat Hunting, Forensics, Incident Response, Detection Engineering), intro Penetration Testing, intro Application Security 1
#198: Filled Recruitment , project management &salws 3
#201: Filled A-Z I have led programs and mentored many people across all domains of cybersecurity. I am also good at finding the right person to help when I am not that person. 1
#202: Filled Blue team 1
#203: Filled General 1
#204: Filled Threat hunting, Pen test and vulnerability management 33
#237: Filled Educational training programs 1
#238: Filled Security Analyst, Beginner, Security Engineering Certs, Beginner Career, Ethical Hacking for beginners 49
#287: Filled Blue team vulnerability, logs, red team, GRC, red team incident response and digital forensics 14
#301: Filled Cyber Defense, Threat Hunting, Incident Response and SIEM management. 4
#305: Filled Ethical Hacking, Analyst, Cloud Security 238
#543: Filled undecided 1
#544: Filled I am looking for a mentor in cybersecurity Governance, Risk, Compliance and Assurance 15
#559: Filled Beginner Red team and Blue team 1
#560: Filled Ethical hacking,secure development, access control development, incident response,vulnerability management, cloud security,cyber law,cybersecurity ,cracking 5
2436 remaining:  
Mentees

Please note desired area:
Red Team
Blue Team
Purple Team
Cryptography
Malware Analysis
Incident Response
Reverse Engineering
Secure Development
Cybersecurity Sales
Cybersecurity Law

Available Spots Item Details Item Qty
#1: Filled Cybercrime 1
#2: Filled Undecided 1
#3: Filled Undecided 1
#4: Filled Blue Team, Malware Analysis, Incident Response 1
#5: Filled Pentesting, Red Team, Forensics 1
#6: Filled Undecided 1
#7: Filled Beginner 1
#8: Filled Cryptography, Malware Analysis, Incident Response, Cybersecurity Law 1
#9: Filled Red Team 1
#10: Filled Looking for a mentor in malware analysis and incident response. 1
#11: Filled Undecided 1
#12: Filled Information Security 1
#13: Filled All 1
#14: Filled I want to be purple | https://www.youracclaim.com/users/dez-brown/badges 1
#15: Filled Security analyst 1
#16: Filled beginner 1
#17: Filled General 1
#18: Filled Beginner, certs 1
#19: Filled Blue Team, Malware Analysis, Incident Response 1
#20: Filled Cybersecurity Law, Cybersecurity Crime., Cryptography, Cybersecurity Sales 1
#21: Filled Educational training programs, Friday Night Labs and 1
#22: Filled Cryptography, Reverse Engineering, Cybersecurity Law, Malware Analysis, Red Team 1
#23: Filled Undecided 1
#24: Filled Undecided 1
#25: Filled I am undecided on a particular area of focus, so I'm gaining experience to determine which area is of the most interest to me. 1
#26: Filled All areas 1
#27: Filled Analyst, malware analysis, incident response, secure development 1
#28: Filled #8 1
#29: Filled Malware Analysis, Blue Team, Red Team 1
#30: Filled Ethical Hacking 1
#31: Filled Pentesting, Bug Bounty 1
#32: Filled Cybersecurity governance, risk, compliance and assurance, and cybersecurity risk management & law 1
#33: Filled Reverse engineering, red team, cyber security law, undecided/all 1
#34: Filled Undecided Beginner 1
#35: Filled Red Team 1
#36: Filled Red Team 1
#37: Filled Pentesting/Bounty Hunting/ 1
#38: Filled Incident Response, Threat Intelligence 1
#39: Filled Undecided 1
#40: Filled #8: Cryptography, Malware Analysis, Incident Response, Cybersecurity Law, #12: Information Security 1
#41: Filled RedTeam OSCP 1
#42: Filled Ethical Hacker Beginner 1
#43: Filled Safety and Security Critical Computing 1
#44: Filled Pentesting/ bug bounties/ maybe eJPT 1
#45: Filled Ethical Hacking 1
#46: Filled Information Systems 1
#47: Filled Unsure 1
#48: Filled Cyber security 1
#49: Filled CompTia Certs, Ethical Hacking, Penetration testing, security tech 1
#50: Filled Vulnerability management, POAMS, cyber security policy 1
#51: Filled Blue Team, SOC analyst, Crytography, Ethical Hacking 1
#52: Filled Undecided 1
#53: Filled Risk management 1
#54: Filled CEH, cryptography 1
#55: Filled Management and Policy 1
#56: Filled Information Security Analyst/ Blue Team 1
#57: Filled Purple team beginner 1
#58: Filled General 1
#59: Filled Beginner;Certs 1
#60: Filled Cybersecurity Analyst/ Financial 1
#61: Filled undecided 1
#62: Filled Undecided- beginner 1
#63: Filled Use of ML and Data Analytics to detect malware on a network 1
#64: Filled Blue Team, Malware Analysis, Incident Response 1
#65: Filled Network security , application security, forensics 1
#66: Filled Beginner, Network +, Security +, Forensic Analysis, Ethical Hacking 1
#67: Filled undecided 1
#68: Filled Threat Intelligence and or PPython 1
#69: Filled Digital Forensic/ Pentesting 1
#70: Filled Red team ceh 1
#71: Filled Governance, risk and compliance #32 1
#72: Filled general 1
#73: Filled Project Management 1
#74: Filled Beginning career: Risk and Compliance 1
#75: Filled Beginner, Network +, Security +, Forensic Analysis, Ethical Hacking 1
#76: Filled Digital Forensics 1
#77: Filled Network Security Risk Management 1
#78: Filled Security Analyst 1
#79: Filled IT Audit, Governance and or Policy, Information Security not too sure 1
#80: Filled CEH 1
#81: Filled UNDECIDED 1
#82: Filled undecided/reverse engineering 1
#83: Filled undecided-beginner 1
#84: Filled Digital forensics, Ethical hacking, Cyber crime and OSINT. 1
#85: Filled 8,12,15,66,75,78 1
#86: Filled Beginner/Still deciding on path 1
#87: Filled Beginner, undecided 1
#88: Filled Cyber 1
#89: Filled Reverse Engineering 1
#90: Filled Red Team. Incident Response, Digital Forensics 1
#91: Filled Information Security Officer, Ethical Hacker 1
#92: Filled any 1
#93: Filled undecided 1
#94: Filled Red Team 1
#95: Filled undecided, beginner 1
#96: Filled Beginner 1
#97: Filled I’m currently in third party security assessments but I’m interested in either the business side of cyber security and cyber crime procreation and cyber threat intelligence 1
#98: Filled Undecided 1
#99: Filled secure dev, incident response 1
#100: Filled Red Team OSCP 1
#101: Filled Undecided 99
#200: Filled I am interested in cybersecurity governance, risk, compliance and assurance, and law. I'm also low-key interested in malware analysis and reverse engineering. 1
#201: Filled General 1
#202: Filled I'm interested Cybersecurity Governance, Risk, Compliance and Assurance but I am open to other different areas of Cybersecurity as well. 1
#203: Filled Interested in Cybersecurity Analyst 1
#204: Filled Undecided 1
#205: Filled Cloud Security 96
#301: Filled Ethical Hacking, Pen Testing, Bug Bounty 31
#332: Filled Undecided 2
#334: Filled Red Team 75
#409: Filled Governance, Risk, and Compliance 18
#427: Filled Red team 1
#428: Filled Red Team. Ethical hacking, forensics and pen testing. 5
#433: Filled Ethical hacking and undecided 100
#533: Filled Research , red team , soc , open to options 1
#534: Filled Ethical hacking and Penetration testing ( Red Team) 75
#609: Filled Cyber crimes, ethical hacking , pen testing 66
#675: Filled Beginner/new career path 1
#676: Filled All areas within Red Team and blue team 1
#677: Filled General 1
#678: Filled GRC, EH, Data Analytics 3
#681: Filled Blue Team 1
#682: Filled Cyber Crime, Forensics, Cryptography, Incident Response, Threat Intelligence 1
#683: Filled Cloud security 1
#684: Filled Ethical hacking,secure development, access control development, incident response,vulnerability management, cloud security,cyber law,cybersecurity ,cracking 10
#694: Filled Ethical Hacking 102
2205 remaining: