A small academy that rewrites itself every cohort
BlueGrid Forge runs instructor-led cybersecurity analyst training out of Seoul. We started in 2021 with twelve learners in one classroom. Five years and many retros later, we are a seven-person team, three core curriculum tracks, and a replay-engine lab built specifically so analysts can investigate finished incidents on their own clock.
We believe two unusual things. First, mentor feedback is the irreducible piece of a training programme — and the part you cannot scale by template. Second, telling learners what we do not cover is more useful than promising the world.
Four habits we will not optimise away
- 01
Honest about what we cannot promise
We will not guarantee a job, a certification pass, or a transformation. We commit to mentor feedback, lab access, and curriculum we rewrite when retros say to.
- 02
Mentor feedback is load-bearing
Every detection submitted, every after-action written, every brief produced gets reviewed by a working analyst. That is the part we refuse to scale-by-template.
- 03
Lab over lecture
Our cohorts spend 60-70% of contact hours inside the lab. Slides exist; they support work, they do not replace it.
- 04
Limitations get printed, not hidden
The first slide of every track lists what the track does not cover. We would rather lose a sale than over-promise scope.
A short, accurate timeline
- 2021
Founded as a 12-seat instructor-led programme
Da-Eun Kim ran the first cohort out of a single Seoul classroom. Twelve learners, one SIEM, one whiteboard. The retro from cohort 1 still hangs in the office.
- 2023
Replay-engine lab goes live
Tae-Hyun Choi finished building the academy's incident replay infrastructure, allowing every learner to investigate the same finished incident on their own clock.
- 2025
Corporate cohort programme launched
After three pilot enterprise client engagements, the Corporate Analyst Onboarding Programme became a permanent track. Discovery weeks remain mandatory — no exceptions.
Seven people. One academy. Real day jobs in cybersecurity.
Every academy member maintains operational links to working SOCs or detection-engineering teams. We are not a training-only outfit. The reason: cohort feedback is sharper when the person reviewing your detections wrote one for production this morning.
-
Da-Eun Kim
Academy Director · 14 yrs experienceDa-Eun ran enterprise client incident response for a regional MSSP for nine years before founding the academy in 2021. She still personally manages every corporate cohort engagement for its first month. Her view: a junior analyst who learns to write a clear after-action report has a faster career than one who memorises every framework.
Focus: Incident leadership, programme design -
Min-Jun Park
Lead Cybersecurity Instructor · 12 yrs experienceEight years inside SOC operations at a financial-sector enterprise client, then four years on detection content. Min-Jun teaches the SOC Foundations Bootcamp and rewrites at least one module every cohort based on retro feedback. Known for keeping a printed alert-triage rubric on every desk.
Focus: SOC operations, alert triage -
Hannah Bae
Curriculum Designer · 10 yrs experienceHannah came to the academy after running detection content for an enterprise client SOC. She designed the lab's replay engine, owns the Threat Detection Engineering and Cloud Incident Handling tracks, and refuses to teach detection-as-code without a Git workflow attached.
Focus: Detection engineering, cloud IR -
Tae-Hyun Choi
SOC Lab Engineer · 8 yrs experienceTae-Hyun built the academy's incident replay infrastructure on top of open-source telemetry tooling. He maintains the lab, writes the synthetic adversary content, and runs the weekend simulation labs alongside instructor staff. Quietly responsible for keeping the platform stable.
Focus: Lab infrastructure, telemetry -
Yuna Cho
Career Coach · 8 yrs experienceFour years running technical hiring for an enterprise client SOC, then two years coaching analysts through career changes. Yuna leads the Analyst Career Launchpad and reviews every cohort's mock-interview feedback. Will tell you the truth about which roles are not hiring juniors right now.
Focus: Hiring readiness, portfolio review -
Joon-Ho Lee
Lead Cybersecurity Instructor · 11 yrs experiencePreviously ran threat intel for a regional CSIRT, where he learned that intelligence nobody reads is not intelligence. Joon-Ho teaches the Threat Intelligence Fundamentals track and runs the brief-writing reviews for both individual learners and corporate cohorts.
Focus: Threat intelligence, brief writing -
Seo-Yeon Hwang
Curriculum Designer · 9 yrs experienceSeo-Yeon was a GRC programme manager at a regional MSSP before joining curriculum. She owns the Compliance Readiness Workshop and is the academy's point of contact for quality-standards content. Her quietest superpower: writing audit evidence that survives external reviewer Q&A.
Focus: Quality standards, GRC bridging
A short read on our process — and a few things we do not do
What we do
- Run a 90-minute retrospective at the end of every cohort, anonymous and structured.
- Publish an internal change list — what we will change next cohort, what we will not, and why.
- Rebuild lab scenarios when retros consistently say "the scenario felt fake."
- Maintain an admissions assessment for intermediate and advanced tracks. We are willing to recommend a different track or no track at all.
- Let mentors push back on curriculum decisions in writing — we lose those debates in public, when we are wrong.
What we do not do
- Job placement guarantees or income-share agreements. We considered them and decided against.
- Graded letter assessments at module end. We use mentor written feedback instead — it is harder to ignore.
- Vendor certifications outside the listed certification tracks.
- Penetration-testing tradecraft, malware reverse engineering beyond triage, hardware/IoT security. We are defender-focused.
- Cohort sponsorship clauses that compromise mentor independence.
Operating from KR — Seoul, with delivery in English. We work with enterprise clients across compliance-aware industry sectors and quality-standards programmes, and we will say no to engagements that ask us to compromise scope honesty.