
Sign up to save your podcasts
Or


Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber, built his security career on self-taught technical skills while competitors relied on computer science degrees, proving that intelligence analysis fundamentals combined with relentless curiosity often produce superior threat researchers. Scott shares how his background in critical thinking and intelligence studies created stronger foundations than formal technical training and how diverse career backgrounds generate the different perspectives needed to stay ahead of evolving attackers.
Scott also tells Ben why maintaining varied information feeds without getting distracted requires deliberate discipline, how he uses AI daily to process unstructured public threat reports while checking for hallucinations through prompt refinement, and why building trust in remote security teams demands reliability during late-night incidents more than technical brilliance. He reveals his approach to staying current when attackers evolve tactics weekly, the specific frameworks he learned from extracurricular intelligence work that shaped his career more than classroom education, and why documenting your analytical process publicly benefits the community even when the topic has been extensively covered.
Too busy; didn’t listen:
Skip to the Highlight of the episode:
[11:45-12:11] “You need to be able to trust and rely on the support of your colleagues to get through those moments. So understanding where folks are coming from, what challenges they might be facing, certainly on a technical aspect, knowing all of your teammates and where they're maybe a little bit stronger, maybe a little bit weaker, and being able to proactively jump in and help out and fill in some of those gaps. Close collaboration and communication goes hand in hand with everything I just said as well.”
Listen to more episodes:
Apple
Spotify
YouTube
Website
By MaltegoScott Small, Director of Cyber Threat Intelligence at Tidal Cyber, built his security career on self-taught technical skills while competitors relied on computer science degrees, proving that intelligence analysis fundamentals combined with relentless curiosity often produce superior threat researchers. Scott shares how his background in critical thinking and intelligence studies created stronger foundations than formal technical training and how diverse career backgrounds generate the different perspectives needed to stay ahead of evolving attackers.
Scott also tells Ben why maintaining varied information feeds without getting distracted requires deliberate discipline, how he uses AI daily to process unstructured public threat reports while checking for hallucinations through prompt refinement, and why building trust in remote security teams demands reliability during late-night incidents more than technical brilliance. He reveals his approach to staying current when attackers evolve tactics weekly, the specific frameworks he learned from extracurricular intelligence work that shaped his career more than classroom education, and why documenting your analytical process publicly benefits the community even when the topic has been extensively covered.
Too busy; didn’t listen:
Skip to the Highlight of the episode:
[11:45-12:11] “You need to be able to trust and rely on the support of your colleagues to get through those moments. So understanding where folks are coming from, what challenges they might be facing, certainly on a technical aspect, knowing all of your teammates and where they're maybe a little bit stronger, maybe a little bit weaker, and being able to proactively jump in and help out and fill in some of those gaps. Close collaboration and communication goes hand in hand with everything I just said as well.”
Listen to more episodes:
Apple
Spotify
YouTube
Website