PodParley PodParley

Collaborating Capabilities in the DETH Squad with Eric Thomas

Episode 29 of the Hacker Valley Blue podcast, hosted by Hacker Valley Media, titled "Collaborating Capabilities in the DETH Squad with Eric Thomas" was published on December 1, 2022 and runs 55 minutes.

December 1, 2022 ·55m · Hacker Valley Blue

0:00 / 0:00

Eric Thomas, Detection & Response Engineer at HD Supply, brings his 15 years of experience in tech and cyber to the show this week to discuss collaboration— the most essential piece of the purple team formula. Eric walks us through his day-to-day routine as an engineer and provides us with his own unique insight into his current company's purple team process. Additionally, Eric teaches us about his unique approach to training future professionals with red and blue team skills and philosophies.   Timecoded Guide: [00:00] Transitioning from a tech/IT environment into cyber engineering [12:03] Walking through the day-to-day of a defense and response engineer [16:48] Collaborating with the DETH purple team  [29:27] Developing security protocols for IoT and OT devices  [39:33] Going beyond the "back in my day" training stereotype [51:22] Being the not-so-smartest person in the room    Sponsor Links: Thank you to our friends at Axonius and PlexTrac for sponsoring this episode! The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley   What is the collaboration between red and blue teams like in your current role as a detection and response engineer? Although Eric is humble enough to admit that the purple team processes in his current work are not his singular idea, he will admit that he led the charge for a more collaborative environment. Leading this initiative started with the desire for a better SOC team. Eric's collaboration wasn't formal at all— he would simply ask other departments for help with their expertise— but this process led to a massively successful process that continues to this day. "My idea was, if we're trying to detect adversarial behavior, we have a resource internally. Who are experts at adversarial behavior? Why try to figure this out ourselves, right? It started off as a very informal thing. It started off as [collaborative] teams."   Can you give a brief description of what IoT devices are and what type of testing you do with them? IoT is more than another acronym in the cyber industry— it refers to the Internet of Things, or the way everyday devices connect to the internet and to each other. The concept of IoT heavily connects to OT, or operational technology. Unfortunately, because these are lesser known systems, they're less secure and less understood by security teams. Eric's team of consultants aims to fix that issue, providing security protocols where there are none.  "We have the technology and the mechanisms to protect our traditional IT. When it comes to OT and Internet of Things (IoT devices), this has been significantly overlooked. What we're seeing is a push to get security professionals more interested in protecting these devices."   How are you training future professionals and teaching them to do things differently from the problematic ways you learned back in the day? It's almost too easy to slip into the problematic "back in my day" mindset of an experienced professional, but Eric actively combats the idea that the old ways of doing security were better when training students. Instead, Eric advocates for students to take a different, more unified approach to their learning process. Aspiring professionals shouldn't work in a silo and should instead be exposed to red and blue team processes during their learning journey.  "Don’t go into the silo, build your network, talk to people across the aisle, it's gonna make you a better pen tester. That’s what I tell [upcoming professionals], that the more blue team friends you have, it's going to make you a better pen tester.”    What advice do you have for any up-and-co

Eric Thomas, Detection & Response Engineer at HD Supply, brings his 15 years of experience in tech and cyber to the show this week to discuss collaboration— the most essential piece of the purple team formula. Eric walks us through his day-to-day routine as an engineer and provides us with his own unique insight into his current company's purple team process. Additionally, Eric teaches us about his unique approach to training future professionals with red and blue team skills and philosophies.

 

Timecoded Guide:

[00:00] Transitioning from a tech/IT environment into cyber engineering

[12:03] Walking through the day-to-day of a defense and response engineer

[16:48] Collaborating with the DETH purple team 

[29:27] Developing security protocols for IoT and OT devices 

[39:33] Going beyond the "back in my day" training stereotype

[51:22] Being the not-so-smartest person in the room 

 

Sponsor Links:

Thank you to our friends at Axonius and PlexTrac for sponsoring this episode!

The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley

PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley

 

What is the collaboration between red and blue teams like in your current role as a detection and response engineer?

Although Eric is humble enough to admit that the purple team processes in his current work are not his singular idea, he will admit that he led the charge for a more collaborative environment. Leading this initiative started with the desire for a better SOC team. Eric's collaboration wasn't formal at all— he would simply ask other departments for help with their expertise— but this process led to a massively successful process that continues to this day.

"My idea was, if we're trying to detect adversarial behavior, we have a resource internally. Who are experts at adversarial behavior? Why try to figure this out ourselves, right? It started off as a very informal thing. It started off as [collaborative] teams."

 

Can you give a brief description of what IoT devices are and what type of testing you do with them?

IoT is more than another acronym in the cyber industry— it refers to the Internet of Things, or the way everyday devices connect to the internet and to each other. The concept of IoT heavily connects to OT, or operational technology. Unfortunately, because these are lesser known systems, they're less secure and less understood by security teams. Eric's team of consultants aims to fix that issue, providing security protocols where there are none. 

"We have the technology and the mechanisms to protect our traditional IT. When it comes to OT and Internet of Things (IoT devices), this has been significantly overlooked. What we're seeing is a push to get security professionals more interested in protecting these devices."

 

How are you training future professionals and teaching them to do things differently from the problematic ways you learned back in the day?

It's almost too easy to slip into the problematic "back in my day" mindset of an experienced professional, but Eric actively combats the idea that the old ways of doing security were better when training students. Instead, Eric advocates for students to take a different, more unified approach to their learning process. Aspiring professionals shouldn't work in a silo and should instead be exposed to red and blue team processes during their learning journey. 

"Don’t go into the silo, build your network, talk to people across the aisle, it's gonna make you a better pen tester. That’s what I tell [upcoming professionals], that the more blue team friends you have, it's going to make you a better pen tester.” 

 

What advice do you have for any up-and-coming security folks who want to move into the industry? 

Collaboration is the name of the game, and Eric wants up-and-coming security practitioners to approach collaboration from a place of learning. No matter how knowledgeable or skilled you are in a certain process or technology, remember that you’re not the smartest person in the room in every situation. Be curious about the work of others around you, and don’t be afraid to ask questions and learn from your peers, no matter what team they’re on. 

"If you can learn anything from my story, it's that you should collaborate, network, and talk to people. Never go into a room where you know you're going to be the smartest person, and never think you're the smartest person in the room, because then you won't ask questions."

---------------

Links:

Keep up with our guest Eric Thomas on Twitter and LinkedIn

Connect with Davin Jackson on LinkedIn and Twitter

Watch the live recording of this show on our YouTube

Continue the conversation by joining our Discord

Hear more from Hacker Valley Media and Hacker Valley Blue

 

Chapters 1-3

Jan 2, 2026 ·27m

Chapters 4-10

Jan 1, 2026 ·22m

Chapters 11-15

Dec 31, 2025 ·23m

Chapters 16-20

Dec 30, 2025 ·28m

Chapters 21-23

Dec 29, 2025 ·30m

Hacker Valley Red Hacker Valley Media Exploring the offensive side of cybersecurity through eyes of the experts that build it. Looking at red teaming, bug bounty, pentesting and more. Old Hampshire Vignettes by Mary Elizabeth Hawker Loyal Books Lanoe Falconer is the pseudonym of the English writer, Marie Elizabeth Hawker (1848 - 1908). Her works, though few, were well received. She lived most of her life in the Hampshire Valley, the source of these verbal sketches. Never married, her health was precarious, preventing her from writing more, though she wished to. She died of tuberculosis, as did her brother. Mademoiselle Ixe Mary Elizabeth Hawker This is a story by the English writer Mary Elizabeth Hawker (1848-1908) entitled Mademoiselle Ixe, by[pseudonym] Lanoe Falconer. The manuscript had been previously rejected by many publishers. The heroine is a governess in an English country house. The mystery is cleverly handled, and the artistic treatment showed a delicacy and refinement which were uncommon in English writers of short stories. The Saturday Review declared it to be 'one of the finest short stories in England.' Success was great and immediate. Gladstone wrote and spoke the praises of the book, of which the circulation was forbidden in Russia; it was admired by Taine. Over 40,000 copies of the English editions were sold, and there were also continental and American editions. It was translated into French, German, Dutch, and Italian. Hawker’s works, though few, were well received. She lived most of her life in the Hampshire Valley. Never married, her health was precarious, preventing her from writing more, though she wis Aprendamos Sobre La Urbanización Morales Magallón Giovanny Analizaremos sobre la urbanización que ha vivido el valle de México, donde las experiencias y los saberes nos han ayudado a hacer este podcast. Un trabajo de: Giovanny Morales Magallón.
URL copied to clipboard!