Once a year, just before the Christmas break, cybersecurity experts from around the world gather together and compete in the SANS NetWars Tournament of Champions, an invite-only cybersecurity competition featuring the top-scoring 200 players from their regional equivalents. This competition tests cybersecurity professionals across hands-on challenges in penetration testing, forensics, and threat detection. Competitors solve increasingly difficult problems under time pressure, earning points for each successful challenge.
This year, Airbus Protect sent two of its cybersecurity experts to represent the company at the event in Washington, D.C. We sat down with Simon Hilchenbach and Kynan Jones to hear about their experience.
Tell us about your roles at Airbus Protect.
Simon Hilchenbach: I work as a Cybersecurity Engineer at Airbus Protect in Germany. I focus on the engineering side of our SOC services, which includes system design, building internal tooling, and automation. A portion of my work also involves operations, making sure everything runs smoothly. Basically, my job is to ensure that our SOC analysts have the right infrastructure and tools to deliver high-quality security monitoring and response to our customers.
Kynan Jones: I’m an Incident Responder at Airbus Protect UK, part of a multinational DFIR (Digital Forensics & Incident Response) team covering the UK, France, and Germany. We specialise in helping organisations navigate critical security events, providing everything from rapid doubt removal to complex ransomware mitigation and aiding in recovery across multi-platform environments.
How did you end up at the Tournament of Champions?
Simon Hilchenbach: To qualify for the Tournament of Champions, you first have to compete in a regional SANS NetWars event and score high enough to earn an invitation. I was attending a SANS training workshop in Amsterdam in August, and the NetWars competition was running alongside it. I’ve always enjoyed competitive challenges, so I decided to participate. Finishing first there earned me the invitation to Washington.
What does the competition actually involve and what was the atmosphere like?
Kynan Jones: Over two days, you work through hands-on cybersecurity challenges covering areas like web pentesting, binary exploitation, and forensics. You earn points for each challenge you solve, and the harder the challenge, the more points you get. The goal is to climb the leaderboard and finish as high as possible.
Simon Hilchenbach: You could really see how much effort was put into the competition’s venue. The event took place in a dark ballroom bathed in red light, with intense music playing the whole time. Players sat at long rows of tables, eyes glued to their screens. Everyone came prepared: custom keyboards, portable monitors, one guy even brought VR glasses. There was a large screen next to the stage showing the top 10 leaderboard in real time. Watching the names move up and down, people fighting for those top spots, the competitive atmosphere was palpable.
How did you both perform?
Simon Hilchenbach: We finished in 4th and 19th place, respectively. At this incredibly high level of competition, I still can’t quite believe it. Due to the 4th place finish, we also got ourselves a nice trophy to showcase!
When you’re in the heat of a tournament like NetWars, or a real-world breach, what is the core philosophy that keeps you grounded?
Kynan Jones: With Objective orientated focus, it is so, so easy to see something interesting whilst in the middle of a task and steer off into a rabbit hole. This can result in significant findings, learnings or a huge time sink. Note it down and continue with your objective. Timelining as you go along is imperative as humans aren’t perfect, and in many instances early on I would spend time going back through my process just to find said gateway to the rabbit hole.
Simon Hilchenbach: 100%. With experience in systems-level thinking, you develop an intuition for where it’s worth digging deeper and where it’s not. There were moments in the competition where I had to resist the urge to explore something interesting and just move on to the next challenge.
Infrastructure is becoming increasingly complex. How do you handle network-based forensics when you’re dealing with massive amounts of data?
Kynan Jones: For massive scale, we move away from traditional full-packet capture, which is often too heavy or unfortunately unfeasible. We rely heavily on on-prem netflow and cloud platform telemetry. Many tools utilise a self-learning AI approach to baseline “normal” behavior, allowing us to spot anomalies without needing to manually sift through every bit. In the cloud, we leverage native logs such as AWS VPC Flow Logs or Azure VNet flows to gain high-level visibility. It’s about finding the signal in the noise before we commit to a deep-dive.
Speaking of the cloud, we’ve seen a massive shift in how attackers compromise businesses. Can you explain this further?
Kynan Jones: While Cloud has brought along massive capability and scalability to businesses of all sizes, it has introduced new threat vectors. We’re seeing a surge in session token theft, which is particularly dangerous because it often requires no MFA once the token is hijacked. We’re also seeing a shift away from traditional credentials in favor of API keys, which are frequently left exposed, hard coded or leaked.
This has added a significant knowledge gap for security professionals. You can’t just be a “Windows guy” anymore; you have to understand the specific monitoring and identity frameworks of multiple cloud platforms to stop a modern attack in its tracks.
Sometimes a broad view isn’t enough. You’ve described some of your work as “pinhole surgery.” Can you elaborate on that?
Kynan Jones: While our standard modus operandi is rapid DFIR, some cases such as insider threats and Advanced Persistent Threats (APTs) demand a different gear. In these instances, a fine combed approach is mandatory. Advanced actors (or employees) often have intimate knowledge of the environment or use sophisticated anti-forensic or defense evasion capabilities that wipe away easy detection opportunities. “Pinhole surgery” involves the research and investigation of lesser-known or undocumented artifacts, and in many cases doom-scrolling a wealth of logs! We look for the tiny, forensic breadcrumbs that weren’t intended to be logs, allowing us to reconstruct a timeline even when the attacker thought they’d left no trace.
What about the malware itself? Are we seeing entirely new threats, or just better versions of the old ones?
Kynan Jones: It’s a bit of both… we still see tools that have been around longer than I have been in the field. However, there is a clear shift toward vibe-coded malware in the form of scripts and executables. When utilised, it means traditional signatures fail because the TTPs (Tactics, Techniques, and Procedures) and functionality during the detonation phase change at a much faster rate than before.