Back to blogs
Written by
Block
Published on
October 23, 2024

7 Tips To Transition from Cybersecurity to Blockchain Security Researcher

Explore 7 tips to transition from traditional cybersecurity into blockchain security research. Get tips for navigating the industry and maximizing your opportunity.

Table of Contents

Introduction

Security is a critical requirement for mainstream adoption of DeFi and blockchain technology. However, in the past two months alone there’s been approximately $300 million exploited from blockchain protocols and infrastructure. 

There is a clear need for skilled blockchain security researchers. And, huge opportunity for individual contributors as the security ecosystem experiences exponential growth

This article will explore how to optimize your transition from traditional cybersecurity into blockchain security research. We’ll share tips for navigating the industry and discuss the differences between traditional and web3 security landscapes. We’ll also explore the business realities independent security researchers will encounter to maximize opportunity.

The path to becoming a blockchain security researcher

The worlds of traditional cybersecurity and blockchain security research are at very different maturity levels. For experienced cybersecurity researchers, transitioning into blockchain security research can be confusing. A new set of skills, strategies, and knowledge are necessary to achieve success.

The roadmap from cybersecurity to blockchain security researcher:

  1. Learn smart contract development
  2. Join public security competitions
  3. Understand the blockchain security landscape
  4. Learn a toolset
  5. Build a reputation 
  6. Embrace start-up culture 
  7. Be entrepreneurial 

Diagram of the roadmap to become a blockchain security researcher.

1. Learn smart contract development

For roles in blockchain security, you must have a foundational knowledge of smart contract development and security. Even for non-technical roles, contributors must understand the principles and methods of the systems they are built on.

Luckily, learning how to develop smart contracts and advanced security concepts is freely accessible. Multiple learning platforms offer a clear learning path from beginner to advanced, simply follow the plan. Cyfrin Updraft is the gold standard for blockchain education. 

The path to smart contract security is more viable than ever. In a series of posts, independent security researchers (N0kto, Bube and Nisedo) detail how they transitioned to smart contract auditing from development, academics, and traditional cybersecurity. 

More and more high achieving researchers come from non-technical backgrounds, upskilling in a relatively short period of time. It is possible. Elhaj shared his journey from Taxi Driver to Security Researcher using Cyfrin Updraft, crossing over from a non-technical background into blockchain security. 

Solidity is the most popular smart contract language. Others helpful development languages include Rust, Vyper, JavaScript, Cairo, and Noir. 

Though the universe beyond foundational understanding is more varied than with purely audit or engineering roles, understanding how smart contracts operate remains essential.

2. Join public security competitions

Public audit competitions have become the ‘traditional’ route to success as a smart contract auditor. And many platforms are solely designed to facilitate public smart contract audit competitions including Cantina, Code4rena and Cyfrin CodeHawks.

New security researchers can gain experience with beginner-friendly First Flights contests on Cyfrin CodeHawks. Then, graduate to real public audit contests, sponsored by leading protocols, to earn money and climb the leaderboard. 

Also helpful is performing Capture the Flag (CTF) exercises to test the knowledge that you have learned. Damn Vulnerable DeFi V4 is an excellent collection of such challenges. 

3. Understand the blockchain security landscape

Diagram of the traditional and blockchain security landscapes

The traditional cybersecurity industry has had decades to mature. Blockchain security is in its infancy. 

Concepts, frameworks, tooling, methodologies, and even roles taken for granted in traditional cybersecurity, have either not been created or need time to develop. 

There is a future with a single ‘source of truth’ for securing smart contracts, blockchain infrastructure, and web3 organizations, but it needs to be built first.

A good comparison is the NIST (National Institute of Standards and Technology) Cyber Security Framework. This globally adopted framework provides a common set of controls and systematic methodology for managing cybersecurity risk within an organization. 

In Blockchain security, the two ‘frameworks’ below are a good starting point for providing a systematic methodology to achieve durable security in the smart contract world. 

Solodit checklist

Solodit is the most comprehensive database of vulnerabilities, hacks, exploits, mitigations, and auditor reports publicly available. Its mission is to help developers build protocols more securely. 

It is the core backbone of almost all security researchers' reference knowledge and the most useful tool in the security researcher's arsenal. It has over 12,000 findings to research. From those, the team developed a Checklist as a reference framework for security audits. 

Smart Contract Security Verification Standard

The Smart Contract Security Verification Standard was developed by Damien Rusinek and Pawel Kuryłowicz. In addition to smart contract security controls, it explores operational security measures such as incident response. It also highlights controls such as security threat modeling and adding them into the development lifecycle to reduce security risk. 

A structured, methodological approach in your audit process will increase your chances of finding vulnerabilities. Frameworks, though not a requirement, offer direction and ensure you’ve covered all well known attack surface areas.

4. Learn a blockchain security toolset

Researchers' tools for vulnerability discovery are evolving. For example, static and dynamic analyzers are now available to test codebases and highlight areas for investigation. 

Fuzz testing is an example of dynamic testing for vulnerabilities. Dynamic testing is when the tool actually runs the code during testing allowing security researchers to monitor transaction outputs to reveal issues. 

Echidna is the industry-leading fuzz-testing tool. It uses property-based fuzzing to surface vulnerabilities by testing contracts against user-defined predicates. 

More experimental is Medusa, a cross-platform go-Ethereum smart contract fuzzer inspired by Echnida. Though still in development, it is proving to be one of the most powerful smart contract fuzzers.

Veteran blockchain security researcher Alex The Entreprenerd and his team developed Recon. The tool integrates existing fuzzing applications Echnida and Medusa to simplify operations for security researchers and make it easier to debug tests. 

Cyfrin developed Aderyn, allowing developers to create custom detectors to analyze and uncover specific code-based vulnerabilities. Aderyn is a static analysis tool that looks for issues within code logic. It is highly flexible and enables developers to build their own detectors and easily export findings in markdown format.

5. Network and build a reputation

Diagram of how to network and build a reputation as a blockchain security researcher.

The world of blockchain security and smart contract auditing is niche

Although blockchain security is about securing trust-minimized systems, the collaborations required to build those systems still depend on personal relationships.

As specialists, in a nascent field, security researchers are quickly known to one another. Especially if they do great work. And job opportunities often come through referrals. 

Credibility and reputation are paramount. 

All interactions–performance in public security audits, replies on Twitter/X, discussions in Discord, or comments in Github repos–are largely transparent and publicly available. Your brand is built from the first moment of interaction.

Reputations and credibility are built through public contest wins, collaborations with web3 security teams, independent content creation, and verifiable credentials.

Embrace integrity and professionalism as your guiding principles. These are your most valuable assets in building trust and long-term success. 

Demonstrating high performance is the baseline. Integrity, honesty, and focusing on the right things lead to sponsorship, repeat business, recommendations, and future collaboration.

Positive testimonials and your professionalism will ensure potential sponsors feel confident in your ability to execute high-importance work.

6. Embrace start-up culture

Learning the skills and embracing start up culture as a security researcher.

The culture of blockchain is very different from the work culture of “traditional” industry. And can be a shock to those coming from traditional corporate career paths.

Most blockchain organizations are start-ups with few formal processes that experienced cybersecurity professionals may be used to. 

One advantage is that startups can pivot and pursue new product gaps or market opportunities without much bureaucracy. Adjusting their business quickly as the market or industry landscape changes. 

The disadvantage is that contributors need flexibility and the awareness to adapt to changing needs. 

Corporate organizations have a defined list of roles & responsibilities. In a startup, you may be asked to work on tasks you were not hired for or have little experience doing. 

Security researchers anecdotally note many projects that initially wanted to discuss smart contract audits are now also requesting information on their organization’s traditional cybersecurity posture. 

7. Adopt an entrepreneurial mindset

An entrepreneurial approach is essential. Traditional cybersecurity experts often have no experience with sales or marketing unless they come from consulting, where sales and client management skills are required. 

Understanding the power of personal brand and actively demonstrating and marketing achievement is important. 

Learning and working in public is very much encouraged: posting successes on Twitter/X, developing blog or video content to share learnings and help others. 

As an independent security researcher you should view your work as akin to developing a start-up business. And, you must explore different strategies to grow. 

Build your brand and market your services. Expand your visibility to potential clients. Develop content that adds value. Engage in industry discussions to demonstrate technical acumen.

There’s a large amount of open-source material to help with common challenges. For example, “44 Common Sales Objections & How to Respond” can help you negotiate when discussing a private security review. It is highly recommended that you expand your entrepreneurial knowledge base to assist in generating new business opportunities in the blockchain world.

Diagram of roadmap to adopting an entrepreneurial mindset as a blockchain security researcher.a

The Journey Ahead

Massive opportunity exists in blockchain security. The industry is growing exponentially and the need for experienced voices is essential to elevate blockchain security to the level of traditional cybersecurity. Following this roadmap can help shape your journey. Enabling you to successfully transition from cybersecurity to blockchain security researcher.

About the author

Block spent nearly 10 years climbing the ranks in traditional cybersecurity before moving into blockchain security. He is a freelance smart contract audit manager, team lead, and technical writer. Block leads the Sapphire Dynasty security team, a collective of elite competitive security researchers.

Secure your protocol today

Join some of the biggest protocols and companies in creating a better internet. Our security researchers will help you throughout the whole process.
Stay on the bleeding edge of security
Carefully crafted, short smart contract security tips and news freshly delivered every week.