Interview with Cyber Security Talent: Kaung Myat Min

Cybersecurity/ Ethical Hacking/ Bounty Hunting have been capturing the hearts of young talents in Myanmar.  This time, YEHG is wholeheartedly proud to feature a youngest known-to-date 17-year old cybersecurity talent, Kaung Myat Min




1. A little bit about yourself. 

I am just somebody who enjoys developing things and then breaking them. Sometimes I just break them though. People know me as Kaung Myat Min and I’m currently working as an Associate in BIM Cybersecurity. At the time of writing this, I am 17 years old.  


2. What made you become so obsessed with Cybersecurity? 

I didn’t get into cybersecurity until recently (1-2 years ago), however, I’ve always been
obsessed with thinking outside of the box, learning new things and technology.
I started my path towards cybersecurity through configuring routers and switches. After
countless hours of researching and writing hundreds of projects on network technology, I
moved on towards studying cybersecurity for my bachelor’s degrees.

During this time, my brother (Nay Myat Min) introduced me to Linux Operating System and
Network/Web Application Security as he had been in the cybersecurity field longer than I
have. Ever since then, I haven’t looked back. The high of bypassing authentication systems
and finding Remote Code Executions across servers and applications cannot be compared
to anything else that I know of.


3. Please share how you achieved certain achievements.

I graduated with cybersecurity and network major from Singapore, and I currently hold
eCPPT and OSCP and these achievements would not have been possible without platforms
such as HackTheBox, Tryhackme, etc., and CTF challenges. Somehow, I also had a diploma
in LCCI, but that path didn’t work out (haha).
The main source of guidance I got was probably from hacking books, YouTube videos and

4. How do you foresee yourself in the next couple of years?

My current short-term goals are to crack the OSWE exam and research on new web
application security vulnerabilities. During the studies of OSWE, I have fallen in love white
box penetration testing, and source codes; I believe I will be learning further about web
application technologies in the nearer future.

I also have an eye on studying binary exploitation, reverse engineering and malware analysis
if I have time.

But in terms of my career path, I would love to work for Big 4 companies, and perhaps if I get
lucky enough as a security researcher for world-famous companies such as Fortinet, Splunk
and Crowdstrike.

5. What do you like to tell about anyone pursuing Cybersecurity?

I am pretty sure the time has never been better to learn new technologies. With all the free
time we have during COVID, and the blooming of hacking tutorials and platforms, it has
never been easier to get into.
One thing I definitely recommend anyone going into IT field though is to learn programming.
Just about any language.


6. Please share how we can follow you in social networks.

Feel free to connect me on LinkedIn -

Popular posts from this blog

CubeCart 3.0.20 (3.0.x) and lower | Multiple Cross Site Scripting Vulnerabilities

Open-Realty CMS 3.x | Persistent Cross Site Scripting (XSS) Vulnerability

OxWall 1.1.1 <= Multiple Cross Site Scripting Vulnerabilities (CVE-2012-0872)