Session
From Vulnerabilities to Vacancies: Hacking the Hiring Pipeline
The same skills that help us identify attack surfaces can also reveal overlooked opportunities in our careers. Most cybersecurity professionals rely on noisy job boards or recruiter reposts, often missing roles hidden deep inside company ATS platforms.
This talk introduces a purpose-built ATS reconnaissance and aggregation tool that systematically enumerates Workday tenants and other hiring platforms (Greenhouse, Lever, SmartRecruiters, Recruitee). By pulling listings directly from employer career sites, the tool ensures that applicants see the most current, authoritative openings, not stale third-party posts.
Key Takeaways:
How to identify and enumerate ATS endpoints across industries. Why direct-to-source applications can bypass recruiter noise and improve visibility. Practical strategies for applying security recon techniques to professional growth.

Keelan Knox
Information Security Professional
Oklahoma City, Oklahoma, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top