Penetration Testing The Dev Interview: Attacks to Ace Interviews and Defenses to Build Better Teams
By Wes Winham

The developer hiring process is vulnerable. Let’s attack it! We’ll draw on both the computer security penetration testing toolkit and from lessons learned the hard way across my decade of startup hiring. We'll break down the typical developer interview process. Then, we'll use the lens of social engineering and cognitive bias to identify specific tactics for acing interviews.

Sunday 12:45 p.m.–1:15 p.m. in Cartoon 1

  • Heuristics
  • Cognitive bias
  • Resume attacks
  • Phone screen attacks
  • Take-home test attacks
  • Resume defense
  • Phone screen defense
  • Take-home test defenses

Learning: Attendees will leave armed with both a) tools to be a more effective interviewer and b) tools to presents their best self as a candidate.

Wes Winham

Software entrepreneur specializing in building and scaling SaaS companies. Experience iterating startups from ideas to product to customer validation to scale. Building product teams from structured hiring, through objectives/alignment/coaching and continuous process improvement. Enough digital marketing to be dangerous. Voracious reader/learner.

Loves learning about: Lean Startup Methodology, SaaS Metrics, Product Marketing, Recruiting, Engineering Culture, User Experience, customer discovery, predictable revenue, Python, Django, React, Continuous Delivery, Continuous Integration, AWS, GCE, deployment, devops