Security Consultant Resume Profile
CentrevillE
Objectives
SHAPE
Seeking new challenges and leadership responsibilities within the InfoSec space to advance my capabilities in the field of malware analysis and reverse engineering.
Experience
Confidential
Expert Cyber Security Analysis
I am currently assigned to the Supreme Court of the United States. During this time, I have built a malware and forensic capability for the Court. For this effort, I constructed a malware analysis lab for the safe storage and analysis of malicious artifacts. In addition, I assist incident response by quickly assessing artifacts, network traffic, and make frequent use of PCAP for the extraction of artifacts for analysis.
Confidential
Reverse Engineer
I supported the United States Computer Emergency Readiness Team US-CERT as a reverse engineer, focusing on malware analysis. I have extensive analysis experience with web-based Command and Control servers C2s , Remote Access Trojans RATS , malicious artifacts delivered in spearphishing attacks, custom or public hack tools, etc., implemented in a wide variety of programming languages, Java, JavaScript, Visual Basic, C and others. OllyDbg, IDA Pro, YARA and numerous open source security tools are used to facilitate analysis and detection. Results are captured in malware reports that are used throughout the community for situational awareness and network defense purposes.
Confidential
Professional Services / Senior Security Consultant
While at Securicon, I developed secure baseline configuration guides for Oracle and MS-SQL which were implemented by numerous government agencies in Washington, DC. I was the lead engineer on commercial assignments that included penetration testing, vulnerability assessments, EMS/SCADA, war-dialing and web application security assessments. I was the security engineer which enabled Securicon to achieve PCI certification by assessing a test network set up by MasterCard for this purpose. I authored OWASP web security paper, Your Customers and Their Secrets , a white paper detailing common password management pitfalls faced by organizations attempting to implement password security solutions for their customers.
Confidential
Symantec Security Services / Principal Security Consultant
I served as the lead engineer on numerous assessments for both government and commercial clients. I have conducted penetration tests, vulnerability, web application and war dialing assessments in a wide variety of networked environments. At Symantec, I was responsible for developing the technical components of Symantec's EMS/SCADA security assessment offering and, as such, provided security expertise to help secure many of the Nation's largest energy providers. I have been an active member of the security community and have contributed numerous security checks to several open sourced security tools. One tool, Parse:Nessus:NBE, a Perl module that can be used to extract specific sets of data from Nessus NBE files, is featured in the data correlation section of Syngress Book Nessus Network Auditing and in Penetration Testing Security Analysis, published by EC-COUNCIL. Also acknowledged in O'Reilly's Linux Server Security for Nessus scan configuration documentation.
Confidential
Development / Security Architect
- As a member of Riptech's development team, I was responsible for conducting security requirements analysis for leading products in the InfoSec space. My research and development work focused on integrating best-of-breed security products into Riptech's Caltarian technology platform, the core of Riptech's managed security services offering. In this role, I gained extensive experience in a wide range of InfoSec technologies that included market leaders in Firewalls, Host and Network IDS products.
- Skills
- OllyDbg, IDA Pro, Penetration Testing, Malware Analysis, Reverse Engineering, YARA, Snort, Nessus, EnCase, Wireshark