| 20,000+ Fresh Resumes Monthly | |
|
|
| Related Resumes Cyber Security Information Gilbert, AZ Threat Detection and Analysis, Vulnerability Assessment, Risk An Scottsdale AI, Machine learning, research writing, Cyber Security Social Me Chandler, AZ Cybersecurity Analyst Cyber Security Goodyear, AZ Cyber Security Analyst Laveen, AZ Quality Assurance Tester and Cyber Security Analyst Chandler, AZ Data Warehouse Business Intelligence Scottsdale, AZ |
| Click here or scroll down to respond to this candidateCandidate's Name , GREM #4585Phoenix, Arizona Street Address PHONE NUMBER AVAILABLE EMAIL AVAILABLECAREER PROFILE24 years of Information Technology and Cyber Security experience within government and private sector. Driving a proven track record of results of accomplishments with a diverse background to encompass a unique skill set of experience and knowledge. Selected value-offered highlights:Trains DHS, HSI and ICE Cyber Financial Crimes Unit Special AgentsFeatured on ABC News, Wall St. Journal, assisted on many high profile cyber investigations.Headed IT Governance, Risk Management and Controls strategy; skilled at applying various security framework directives into a multinational network. (Cyber Security frameworks include NIST 800-53R4,CIS, EO13636, SANS CSC 20, ISO27001/2, EU Directive 95/46/EC, CMM)Manages Incident Response capability within the information processing infrastructure; experience managing threats and incidents impacting information resources utilizing NIST 800-61Computer Incident Handling.Malware Analysis, Reverse Engineering and Cyber Threat Intel Capabilities Derives contextual & actionable threat intelligence based on adversaries Tactics, Techniques and Procedures. Identifies code reuse, shell code, APT, Keylogging, Root Kits (user/Kernel Mode) tracking adversary campaigns with the use of MISP/CRITS Malware Intelligence Sharing Platform. Automates indicators of compromise into enterprise infrastructure. Correlates attack campaigns via various threat intel feeds and internal sources.Introduces Network Defenses & End Point Security with centralized management solutions; Manages network traffic and endpoint activity with MITRE ATT&CK/Navigator, Cyber Kill Chain, and maps to tools to identify indicators and attributes of an attack, surfacing vulnerabilities to remediate.Creates and maintains High Security Architecture and Design; experience with concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and secure controls used to enforce various levels of confidentiality, integrity, and availability.Authored Cyber Defense Frameworks Ring Aggression for Threat Intelligence and Threat HuntingTools used are available upon request, there are many. Candidate's Name GREM #4585PROFESSIONAL EXPERIENCETHETA432 CYBER FUSION CENTER PRINCIPALJUNE 2016 FEBRUARY 2023Designs, develops, manages NIST CSF/NIST 800-53r4/NIST 800-61 security controls, initiatives while helping protect network boundaries, keeping computer systems and network devices defensible against attacks while providing security services to protect highly sensitive data like passwords and customer information. SME in Cyber Defense works hands-on with network equipment and actively monitors systems for attacks and intrusions. Reverse engineers malware to derive IOC's & threat intelligence and actively scan the network for IOCs derived from reversing. Dissect various Phishing Kits to understand URI and build patterns to identify adversary tactics. Provides strategic level reports designed to communicate risk to executive management CISO, CTOs, CIOs. Provides operational intelligence to managers and tactical level reports to for consumption and dissemination for the purpose of threat profiling.NORSE CORPORATION SENIOR CYBER THREAT INTELLIGENCE & CYBER THREAT HUNTER SEPTEMBER 2016 JUNE 2018Leads direction of technology platforms designed to aid training and innovation to the Department of Homeland Security, Homeland Security Investigations and I.C.E. Creates, designs and assists in technological development for DHS/HSI/ICE and assists in investigations with the Cyber Financial Crimes Unit. Tracks, identifies, and uncovers identities of cyber criminals and enumerates bitcoin transactions to the source. Helps protect network boundaries, keeping computer systems and network devices hardened against attacks while providing security services to protect highly sensitive data. Designs Cyber Threat Intelligence Programs for clients and provides malware assessments, IOCs and threat intel. Works hands-on with network equipment and actively monitors systems for attacks and intrusions. Reverse engineers malware to derive IOC's & threat intelligence and actively scan the network for IOCs derived from reversing. Dissect various Phishing Kits to understand URI and build patterns to identify adversary tactics.MOLINA HEALTHCARE CIRT SUPERVISOR ADVANCED THREAT INTEL & CYBER THREAT HUNTING NOVEMBER 2014 to JANUARY 2016Reverse engineers malware to derive IOC's & threat intelligence. Designs and develops new techniques and strategies in the CIRT which quickly, effectively, and efficiently handle incidents while designing new signatures for prevention. Detects advanced malware and quickly responds utilizing live memory analysis tools. Collects, stores, and analyzes log data as well as monitors and responds to security events utilizing forensic tools, Threat intel frameworks to track threat actors.HEALTHCARE RESOURCE GROUP, INC. INFORMATION SECURITY OFFICER, CIRT MAY 2013 to OCTOBER 2014Maintained security with established frameworks. Maximized cyber security tools to increase cyber defense capability and minimize false positive rates to prevent analyst fatigue. Created Playbooks to maximize analyst efficiency in responding to events and created an escalation path to further reduce analyst fatigue. Created diagrams to further the pursuit of reducing analyst churn while creating a more effective culture within the SOC org. Created KPIs to address MTTD, ticket times to ensure fast and effective resolutions. PREVIOUS EXPERIENCEMETAMASSIVE CYBER CRIME CONSULTANT- AUGUST 2011 to OCTOBER 2014 AUTISM SPEAKS INFOSEC MANAGER- APRIL 2007 to MAY 2011 DIGITAL INTERACTIVE INFOSEC MANAGER- FEBRUARY 2006 to FEBRUARY 2007 RADYSYS CORPORATION NETWORK SECURITY CONSULTANT- OCTOBER 2004 to FEBRUARY 2006 iRISE SYSTEM SECURITY ADMINISTRATOR- NOVEMBER 2002 to OCTOBER 2004 SONICWALL SECURITY ENGINEER SEPTEMBER 1999 to NOVEMBER 200 Candidate's Name GREM #4585EDUCATIONSOUTHER NEW HAMPSHIRE UNIVERSITY 2023 2024MAJOR: FORENSIC PSYCHOLOGY MINOR: EVOLUTIONARY PSYCHOLOGY UNITED STATES ARMY VETERAN COMBAT MEDICUNIVERSITY OF HEALTH SCIENCES ARMY MEDICAL DEPARTMENT AMEDD 1996-1997 BROOKE ARMY MEDICAL CENTER (BAMC) MEDICAL CORPS IPAP SAN ANTONIO TEXAS Los Angeles Harbor CollegeLong Beach City CollegeCERTIFICATIONSGIAC GREM #4585 |