CyberGames Leaderboard Candidate Division

Information

 LAST CHALLENGE COMING FRIDAY, OCTOBER 28TH @ 9AM MT

The Colorado Cyber Games – Candidate Division was built to give all students an opportunity to showcase their skills in front of the eyes of local employers. If you’re looking at this page you have probably participated in or thought about participating in a “capture the flag” competition to improve your skills. Those events require a set time and location and don’t have a focus on developing candidate to employer connections. The CCRC is focused on workforce development in uniquely Colorado, so we are excited to use our network and connections to bring both sides of the equation together with the Colorado Cyber Games competitions and leaderboard page.

When you register, you’ll be able to provide a resume, your LinkedIn profile, school affiliation, and industry certifications. The more you provide, the more employers can see so they can invite you to apply for open positions. All information you provide will be posted on the leaderboard next to your name (yes, you must use your real name). For the competitions held in 2023, companies can sponsor the event to get their job postings in front of your eyes on the leaderboard page as well.

The Cybersecurity job market is fiercely competitive. At the same time, Colorado has 20,000 open positions with “cyber” in the job description. Stand out by showcasing your skills and climb your way to the top of the leaderboard!

COMPETITION TITLE SPONSOR: Your company here

Title Sponsor can provide description of their company and any relevant information.

JOB POSTING: The title sponsor will get to place any job postings in this section.

WHITE HAT SPONSORs

MORE INFORMATION COMING SOON!

SERVICE DESK SPONSORS

MORE INFORMATION COMING SOON!

Colorado Public Agency Job Postings

MORE INFORMATION COMING SOON!

Candidate Division

 NameTime to CompleteOverall RankChallenge 1 Rank (Time)Challenge 2 Rank (Time)Challenge 3 Rank (Time)Challenge 4 Rank (Time)ResumeLinkedIn ProfileSchool AffiliationIndustry Certifications
Kyle Leupold00:42:40100:14:4300:27:4303:06:0000:42:40Kyle’s LinkedInJohnson & Wales UniversityComp TIA Security+
Trevor Smith02:07:57202:30:3302:21:2212:38:0002:07:57Trevor’s ResumeCISSP: Certified Information Systems Security Professional
Takayuki Arai00:23:16300:10:5303:48:0000:23:16SANS Technology InstituteOSCP: Offensive Security Certified Professional
Mario Zamora400:23:1200:17:50Mario’s ResumeMario’s LinkedInCSU – PuebloCISM: Certified Information Security Manager
David Mendez500:19:45David’s LinkedInPikes Peak State College
Yadiel Cordero601:49:39Yadiel’s ResumeYadiel’s LinkedInNorthwest Vista / University of Texas at San AntonioComp TIA Security+

Challenge Descriptions

Week 1: Linux CLI Fundamentals
In this challenge, your knowledge of basic command-line GNU/Linux server administration tools will be tested.
LEARNING OUTCOMES
  • Knows how to manage users.

  • Knows how to manage files.

  • Knows how to manage software.

  • Knows how to create and execute basic scripts.

  • Knows how to gather system information.

 
Week 2: Windows – Malicious Process Challenge 
Using a SIEM solution like Splunk to find and trace malicious processes in an operating system is an everyday task for a SOC Analyst. This module will test your Splunk and Sysmon skills by tracing a malicious process in a Windows box. 
LEARNING OUTCOMES
  • The learner traces processes with Sysmon.

  • The learner queries events in Splunk. 

 
Week 3: SSH Backdoor Challenge 1 AND SSH Backdoor Challenge 2 
SSH Backdoor Challenge 1 
You are a SOC engineer at a small company. You have received news that one of your servers has been hacked into. A malicious user continuously logs in via SSH somehow and creates files in the root directory. 
In this challenge, you are tasked with finding out how this hacker is getting in and patching the hole. 
LEARNING OUTCOMES 
  • The learner understands the concept of backdoors. 

  • The learner understands how to apply different analysis methods to find backdoors in infected systems. 

SSH Backdoor Challenge 2 
You are a SOC engineer at a small company. You have received news that one of your servers has been hacked into. A malicious user continuously logs in via SSH somehow and creates files in the root directory. 
In this challenge, you are tasked with finding out how this hacker is getting in and patching the hole. 
LEARNING OUTCOMES 
  • The learner understands the concept of backdoors. 

  • The learner understands how to apply different methods of analysis to find backdoors in infected systems.