Volunteer @ BGH Foundation

Black Girls Hack Foundation (BGH Foundation) is a non-profit organization that is dedicated to increasing diversity in Cybersecurity. We hope to accomplish this by

  • Increasing Representation – BGH Foundation’s goal is to increase diversity and representation in the Cyber field. We believe that representation matters and we hope to help increase representation by portraying Black women in Cyber.
    • #FeatureFridays of Black Women in Cyber through our social media campaign
  • Mentoring – BGH Foundation believes that in addition to having the skills, and training to join the cyber field that they need to know what to expect. BGH Foundation is creating a mentoring program to help connect aspiring Cybersecurity professionals to mentors in the field.
    • #CyberMentoringMonday social media campaign
    • Mentoring programs
  • Resume review – BGH Foundation is helping aspiring Cybersecurity professionals to get into the field by helping them structure their resumes and represent themselves in the best way to get past the Applicant Tracking Systems and in front of a hiring manager.
  • Educational training programs – BGH Foundation believes that there is a high entry level cost to obtaining certification training in the cybersecurity field. To help reduce the overhead associated with getting training for cyber certifications, BGH Foundation is offering free study groups to help get aspiring Cybersecurity professionals ready for industry certifications.
    • CEH Study Group
    • Security+ Study Group

  • Friday Night Labs – BGH Foundation wants to continue to operate the Friday Night Labs program so that it’s members can get hands on lab experience.
  • BGH Cloud Labs (Virtualization Program ) One of the barriers for entry for cybersecurity professionals is not being able to create a home lab or a virtual lab due to the high costs of operating in the cloud and the resource intensiveness of home lab virtualization setups. To help reduce the barriers to entry into Cyber BGH Foundation is creating BGH Cloud Labs a program to help create a cloud lab that will allow students to participate in lab exercises that will provide them with hands on skills to help aid their entry into cybersecurity.
  • Board and Executive Leadership – BGH Foundation has 5 vacant Board seats and several open executive leadership positions. Positions require submission of a resume, Non Disclosure Agreement, a minimum 1 year commitment and approval by the existing Board of Directors.
  • Volunteer Coordinator – BGH has several volunteer positions and a lot of expressed interest for volunteers so it would be great if you’ve got experience or an interest in doing this.

***All Volunteers (except mentors) will be requested to complete a Non Disclosure Agreement.***

« View all Sign-up Sheets

Mentoring

Event Chair: Tennisha Martin

DETAILS:

BGH Foundation believes that in addition to having the skills, and training to join the cyber field that they need to know what to expect. BGH Foundation is creating a mentoring program to help connect aspiring Cybersecurity professionals to mentors in the field.

Mentoring Program Coordination

Responsible for helping to match mentors to mentees

Available Spots
Filled
Mentors

Red Team
Blue Team
Purple Team
Cryptography
Malware Analysis
Incident Response
Reverse Engineering
Secure Development
Cybersecurity Sales
Cybersecurity Law
General

Available Spots Item Details Item Qty
#1: Filled Blue Team and Purple Team 4
#5: Filled Cyber Risk Management and Cyber Law 2
#7: Filled Pentesting/Ethical Hacking 1
#8: Filled General, Cryptography, Secure Development 4
#12: Filled DFIR, Threat Intel, Detection, Public Speaking, Leadership & Strategy, 1
#13: Filled Offensive Operational Security for software 1
#14: Filled Blue Team, Vulnerability Management, Architecture, Logs, Logs, Logs 1
#15: Filled Cybersecurity Governance, Risk, Compliance and Assurance 1
#16: Filled C- All of the above. I've worked in network security, cybersecurity analyst, DFIR, and pentesting roles, along with executive management. 7
#23: Filled Safety and Security Critical Computing 1
#24: Filled Incident Response 1
#25: Filled Messaging Security (spam, phishing etc.) 1
#26: Filled Vulnerability Management 1
#27: Filled Incident Response, cryptography, AWS 1
#28: Filled general; public policy; national security; research and scholarship; economics and social science of infosec; 1
#29: Filled Threat Intelligence, SOC, Penetration Testing 1
#30: Filled Threat Intellience, Forensics 1
#31: Filled Penetration Testing, Ethical Hacking, Bug Bounty, Software Engineering, Security Research 1
#32: Filled Pentesting/Ethical Hacking, Reverse Engineering, Security Research, Malware Analysis, Leadership & Strategy, Executive Management 1
#33: Filled security research, exploitation, reverse engineering, web application hacking, pentesting, red teaming, education (lectured at UNSW in Sydney for ~9 years) 1
#34: Filled Blue Team, Secure Development (specifically network situational awareness and development of tools and systems for security monitoring and incident analysis) 1
#35: Filled Career transition, SOC, human networking, self-branding, OSINT, general InfoSec 1
#36: Filled General Topics, Reverse Engineering, Vulnerability Research, Secure Development, CTF tournaments, some applied cryptography and web security 1
#37: Filled Blue Team (Threat Hunting, Forensics, Incident Response, Detection Engineering), intro Penetration Testing, intro Application Security 1
#38: Filled Vulnerability Management, threat, general 1
#39: Filled Blue team 14
#53: Filled IoT 2
#55: Filled Red Team 1
#56: Filled Information systems 3
#59: Filled Application Security 1
#60: Filled Product and application security, secure development, security engineering management 3
#63: Filled undecided 23
#86: Filled Product and IOT security, Security Engineering, EPP and EDR, Risk Management. 1
#87: Filled Product Security, Blue Team, Red Team 1
#88: Filled Malware Analysis, Reverse Engineering, Secure Development, General (C, assembly, python, ghidra, IDA, iOS/macOS internals, vulnerability research, exploit development) 1
12 remaining:  
Mentees

Please note desired area:
Red Team
Blue Team
Purple Team
Cryptography
Malware Analysis
Incident Response
Reverse Engineering
Secure Development
Cybersecurity Sales
Cybersecurity Law

Available Spots Item Details
#1: Filled Cybercrime
#2: Filled Undecided
#3: Filled Undecided
#4: Filled Blue Team, Malware Analysis, Incident Response
#5: Filled Pentesting, Red Team, Forensics
#6: Filled Undecided
#7: Filled Beginner
#8: Filled Cryptography, Malware Analysis, Incident Response, Cybersecurity Law
#9: Filled Red Team
#10: Filled Looking for a mentor in malware analysis and incident response.
#11: Filled Undecided
#12: Filled Information Security
#13: Filled All
#14: Filled I want to be purple | https://www.youracclaim.com/users/dez-brown/badges
#15: Filled Security analyst
#16: Filled beginner
#17: Filled General
#18: Filled Beginner, certs
#19: Filled Blue Team, Malware Analysis, Incident Response
#20: Filled Cybersecurity Law, Cybersecurity Crime., Cryptography, Cybersecurity Sales
#21: Filled Educational training programs, Friday Night Labs and
#22: Filled Cryptography, Reverse Engineering, Cybersecurity Law, Malware Analysis, Red Team
#23: Filled Undecided
#24: Filled Undecided
#25: Filled I am undecided on a particular area of focus, so I'm gaining experience to determine which area is of the most interest to me.
#26: Filled All areas
#27: Filled Analyst, malware analysis, incident response, secure development
#28: Filled #8
#29: Filled Malware Analysis, Blue Team, Red Team
#30: Filled Ethical Hacking
#31: Filled Pentesting, Bug Bounty
#32: Filled Cybersecurity governance, risk, compliance and assurance, and cybersecurity risk management & law
#33: Filled Reverse engineering, red team, cyber security law, undecided/all
#34: Filled Undecided Beginner
#35: Filled Red Team
#36: Filled Red Team
#37: Filled Pentesting/Bounty Hunting/
#38: Filled Incident Response, Threat Intelligence
#39: Filled Undecided
#40: Filled #8: Cryptography, Malware Analysis, Incident Response, Cybersecurity Law, #12: Information Security
#41: Filled RedTeam OSCP
#42: Filled Ethical Hacker Beginner
#43: Filled Safety and Security Critical Computing
#44: Filled Pentesting/ bug bounties/ maybe eJPT
#45: Filled Ethical Hacking
#46: Filled Information Systems
#47: Filled Unsure
#48: Filled Cyber security
#49: Filled CompTia Certs, Ethical Hacking, Penetration testing, security tech
#50: Filled Vulnerability management, POAMS, cyber security policy
#51: Filled Blue Team, SOC analyst, Crytography, Ethical Hacking
#52: Filled Undecided
#53: Filled Risk management
#54: Filled CEH, cryptography
#55: Filled Management and Policy
#56: Filled Information Security Analyst/ Blue Team
#57: Filled Purple team beginner
#58: Filled General
#59: Filled Beginner;Certs
#60: Filled Cybersecurity Analyst/ Financial
#61: Filled undecided
#62: Filled Undecided- beginner
#63: Filled Use of ML and Data Analytics to detect malware on a network
#64: Filled Blue Team, Malware Analysis, Incident Response
#65: Filled Network security , application security, forensics
35 remaining: