
May 17, 2023
100% OSCP Certified Team: How PacketLabs Recruits Top Talent
Recruiting the right talent, to fill the cybersecurity skills gap for PacketLabs
Recognizing the intrinsic value of a strong and capable cybersecurity team, PacketLabs has been proactive in navigating the imminent skills shortage that plagues the industry.
They embarked on a meticulous search for an industry-recognized course and certification that would serve as a trusted and reliable hiring benchmark, ensuring a team of highly qualified practitioners equipped with the skills necessary to face the evolving cybersecurity landscape with confidence.
Furthermore, PacketLabs puts a large emphasis on the methodological approach and soft skills in pentesting, and this is also precisely what a vendor they would choose as the benchmark needed to have in its curriculum and teach those that take the certification.
Enter OffSec. Through their partnership with OffSec, PacketLabs has now established an “OSCP minimum” in their hiring process to ensure they are only hiring top talent.
Watch the full video case study to learn how PacketLabs is navigating the skills shortage and continues to hire top talent using OffSec certification as a benchmark.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-39914 – Unauthenticated Command Injection in FOG Project’s export.php
Discover details about CVE-2024-39914, a critical unauthenticated command injection vulnerability in FOG Project ≤ 1.5.10.34. Learn how attackers can exploit export.php to execute system commands or deploy persistent webshells.
Jun 26, 2025
2 min read

OffSec News
What It Really Means to “Try Harder”
Discover how OffSec’s “Try Harder” mantra evolved into a mindset, and how it helps learners build grit, creativity, and real-world problem-solving skills.
Jun 23, 2025
7 min read

Research & Tutorials
CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage
CVE-2025-3248 is a critical RCE vulnerability in Langflow that allows unauthenticated attackers to execute arbitrary Python code via unsanitized input to exec(). Learn how it works and how to protect your system.
Jun 18, 2025
2 min read