Quantcast

Threat Intelligence Cyber Resume Phoenix...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Threat Intelligence Cyber
Target Location US-AZ-Phoenix
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cyber Security Information Gilbert, AZ

Threat Detection and Analysis, Vulnerability Assessment, Risk An Scottsdale

AI, Machine learning, research writing, Cyber Security Social Me Chandler, AZ

Cybersecurity Analyst Cyber Security Goodyear, AZ

Cyber Security Analyst Laveen, AZ

Quality Assurance Tester and Cyber Security Analyst Chandler, AZ

Data Warehouse Business Intelligence Scottsdale, AZ

Click here or scroll down to respond to this candidate
Candidate's Name , GREM #4585Phoenix, Arizona Street Address  PHONE NUMBER AVAILABLE EMAIL AVAILABLECAREER PROFILE24 years of Information Technology and Cyber Security experience within government and private sector. Driving a proven track record of results of accomplishments with a diverse background to encompass a unique skill set of experience and knowledge. Selected value-offered highlights:Trains DHS, HSI and ICE Cyber Financial Crimes Unit Special AgentsFeatured on ABC News, Wall St. Journal, assisted on many high profile cyber investigations.Headed IT Governance, Risk Management and Controls strategy; skilled at applying various security framework directives into a multinational network. (Cyber Security frameworks include NIST 800-53R4,CIS, EO13636, SANS CSC 20, ISO27001/2, EU Directive 95/46/EC, CMM)Manages Incident Response capability within the information processing infrastructure; experience managing threats and incidents impacting information resources utilizing NIST 800-61Computer Incident Handling.Malware Analysis, Reverse Engineering and Cyber Threat Intel Capabilities Derives contextual & actionable threat intelligence based on adversaries Tactics, Techniques and Procedures. Identifies code reuse, shell code, APT, Keylogging, Root Kits (user/Kernel Mode) tracking adversary campaigns with the use of MISP/CRITS Malware Intelligence Sharing Platform. Automates indicators of compromise into enterprise infrastructure. Correlates attack campaigns via various threat intel feeds and internal sources.Introduces Network Defenses & End Point Security with centralized management solutions; Manages network traffic and endpoint activity with MITRE ATT&CK/Navigator, Cyber Kill Chain, and maps to tools to identify indicators and attributes of an attack, surfacing vulnerabilities to remediate.Creates and maintains High Security Architecture and Design; experience with concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and secure controls used to enforce various levels of confidentiality, integrity, and availability.Authored Cyber Defense Frameworks Ring Aggression for Threat Intelligence and Threat HuntingTools used are available upon request, there are many. Candidate's Name  GREM #4585PROFESSIONAL EXPERIENCETHETA432  CYBER FUSION CENTER PRINCIPALJUNE 2016  FEBRUARY 2023Designs, develops, manages NIST CSF/NIST 800-53r4/NIST 800-61 security controls, initiatives while helping protect network boundaries, keeping computer systems and network devices defensible against attacks while providing security services to protect highly sensitive data like passwords and customer information. SME in Cyber Defense works hands-on with network equipment and actively monitors systems for attacks and intrusions. Reverse engineers malware to derive IOC's & threat intelligence and actively scan the network for IOCs derived from reversing. Dissect various Phishing Kits to understand URI and build patterns to identify adversary tactics. Provides strategic level reports designed to communicate risk to executive management CISO, CTOs, CIOs. Provides operational intelligence to managers and tactical level reports to for consumption and dissemination for the purpose of threat profiling.NORSE CORPORATION  SENIOR CYBER THREAT INTELLIGENCE & CYBER THREAT HUNTER SEPTEMBER 2016  JUNE 2018Leads direction of technology platforms designed to aid training and innovation to the Department of Homeland Security, Homeland Security Investigations and I.C.E. Creates, designs and assists in technological development for DHS/HSI/ICE and assists in investigations with the Cyber Financial Crimes Unit. Tracks, identifies, and uncovers identities of cyber criminals and enumerates bitcoin transactions to the source. Helps protect network boundaries, keeping computer systems and network devices hardened against attacks while providing security services to protect highly sensitive data. Designs Cyber Threat Intelligence Programs for clients and provides malware assessments, IOCs and threat intel. Works hands-on with network equipment and actively monitors systems for attacks and intrusions. Reverse engineers malware to derive IOC's & threat intelligence and actively scan the network for IOCs derived from reversing. Dissect various Phishing Kits to understand URI and build patterns to identify adversary tactics.MOLINA HEALTHCARE  CIRT SUPERVISOR ADVANCED THREAT INTEL & CYBER THREAT HUNTING NOVEMBER 2014 to JANUARY 2016Reverse engineers malware to derive IOC's & threat intelligence. Designs and develops new techniques and strategies in the CIRT which quickly, effectively, and efficiently handle incidents while designing new signatures for prevention. Detects advanced malware and quickly responds utilizing live memory analysis tools. Collects, stores, and analyzes log data as well as monitors and responds to security events utilizing forensic tools, Threat intel frameworks to track threat actors.HEALTHCARE RESOURCE GROUP, INC.  INFORMATION SECURITY OFFICER, CIRT MAY 2013 to OCTOBER 2014Maintained security with established frameworks. Maximized cyber security tools to increase cyber defense capability and minimize false positive rates to prevent analyst fatigue. Created Playbooks to maximize analyst efficiency in responding to events and created an escalation path to further reduce analyst fatigue. Created diagrams to further the pursuit of reducing analyst churn while creating a more effective culture within the SOC org. Created KPIs to address MTTD, ticket times to ensure fast and effective resolutions. PREVIOUS EXPERIENCEMETAMASSIVE  CYBER CRIME CONSULTANT- AUGUST 2011 to OCTOBER 2014 AUTISM SPEAKS  INFOSEC MANAGER- APRIL 2007 to MAY 2011 DIGITAL INTERACTIVE  INFOSEC MANAGER- FEBRUARY 2006 to FEBRUARY 2007 RADYSYS CORPORATION  NETWORK SECURITY CONSULTANT- OCTOBER 2004 to FEBRUARY 2006 iRISE  SYSTEM SECURITY ADMINISTRATOR- NOVEMBER 2002 to OCTOBER 2004 SONICWALL  SECURITY ENGINEER  SEPTEMBER 1999 to NOVEMBER 200 Candidate's Name  GREM #4585EDUCATIONSOUTHER NEW HAMPSHIRE UNIVERSITY 2023  2024MAJOR: FORENSIC PSYCHOLOGY MINOR: EVOLUTIONARY PSYCHOLOGY UNITED STATES ARMY VETERAN  COMBAT MEDICUNIVERSITY OF HEALTH SCIENCES ARMY MEDICAL DEPARTMENT AMEDD 1996-1997 BROOKE ARMY MEDICAL CENTER (BAMC) MEDICAL CORPS IPAP SAN ANTONIO TEXAS Los Angeles Harbor CollegeLong Beach City CollegeCERTIFICATIONSGIAC GREM #4585

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise