Aaron Miller
Senior System Engineer at IOMAXIS- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Offensive Security Wireless Professional (OSWP)
Offensive SecurityJan, 2013- Nov, 2024 -
Offensive Security Certified Professional (OSCP)
Offensive SecurityJan, 2012- Nov, 2024 -
Certified Information System Security Professional (CISSP)
(ISC)²Jan, 2010- Nov, 2024 -
Certified Information Systems Auditor® (CISA)
ISACASep, 2009- Nov, 2024 -
Certified Ethical Hacker (CEH)
EC-CouncilJan, 2009- Nov, 2024 -
Certified Information Systems Auditor (CISA)
ISACAJan, 2009- Nov, 2024 -
Certified Penetration Tester (CPT)
InfoSec InstituteJan, 2009- Nov, 2024 -
Network+
CompTIAJan, 2006- Nov, 2024 -
Security+
CompTIAJan, 2006- Nov, 2024 -
GIAC Web Application Penetration Tester (GWAPT)
GIACSep, 2010- Nov, 2024 -
GIAC Web Application Penetration Tester (GWAPT)
GIACJan, 2010- Nov, 2024 -
Cisco Certified Design Associate (CCDA)
CiscoJan, 2011- Nov, 2024 -
Cisco Certified Network Associate (CCNA) Security and Wireless
CiscoJan, 2011- Nov, 2024 -
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
GIACMay, 2012- Nov, 2024 -
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
GIACJan, 2012- Nov, 2024 -
GIAC Penetration Tester (GPEN)
GIACJan, 2011- Nov, 2024
Experience
-
MAXISIQ
-
United States
-
Technology, Information and Internet
-
1 - 100 Employee
-
Senior System Engineer
-
Aug 2016 - Present
-
-
Security Researcher
-
Aug 2015 - Present
-
-
-
Crucial Security
-
United States
-
Information Technology & Services
-
1 - 100 Employee
-
Security Researcher
-
Nov 2012 - Aug 2015
Works for Crucial Security, tasks include wireless network reconnaissance and exploitation, staying abreast with the latest attack vectors, researching new attack methodologies and vectors, reverse engineering devices to identify vulnerabilities. Accomplishments included the following: • Reverse engineering of embedded devices and wireless routers to find remotely executable vulnerabilities for use on engagements • Write tools to streamline and automate the targeting process for multiple targets during engagements • Created an automated public vulnerability tracking and database system in order to help identify emerging exploits • Develop custom Linux distributions for use during engagements and setup baseline installation and tracking system • Build and deploy embedded Linux systems for use on engagements in numerous different form factors and covert enclosures • Work with a team to create a methodology for automating the exploitation of wireless routers and networks • Worked on several engagements both solely and with other coworkers to accomplish mission related goals • Design and fabricate parts for use in a deployable wireless attack platform using 3D printers, scanners and CNC machines Show less
-
-
-
Northrop Grumman
-
United States
-
Defense and Space Manufacturing
-
700 & Above Employee
-
Red Team Lead / Penetration Tester
-
Oct 2008 - Nov 2012
Worked for the United States Army on the Army Red Team. Lead numerous assessments of Army networks worldwide. Supported several Global Exercises providing realistic threat replication for network defenders. Performed black box and grey box penetration testing on multiple networks throughout the entire Army. Researched new exploits and attack vectors to provide the most current and realistic threat for Army customers. Developed new tools and scripts to aid with assessments and to help streamline testing. Wrote assessment reports detailing findings and the attacks performed as well as suggestions for fixing issues. Attended several planning conferences and meetings in preparation for missions. Accomplishments include the following: • Lead 7 different two week engagements worldwide and was a tech for 8 other engagements all with 100% success rate • Provided technical briefings for both high-level executives and mid-level technicians and administrators • Developed Courseware for Red Team 101 Course for all new personnel to the team • Personally found several vulnerabilities in different applications in use Army-wide • Built hacking lab for testing new techniques, tools and for training • Mentored new team members and provided hands on training Show less
-
-
-
General Dynamics Information Technology
-
IT Services and IT Consulting
-
700 & Above Employee
-
Senior Network Engineer
-
Nov 2003 - Oct 2008
Worked for the United States Army Southern Command and United States Army South. Managed and maintained intricate networks of over 300 devices, included encryption devices, Ethernet and ATM switches, routers, firewalls and Video Teleconferencing equipment. Built and maintained servers for managing network devices. Worked closely with Defense Information Systems Agency (DISA) and other agencies to quickly resolve network outages and issues. Maintained detailed documentation of logical network layout and configuration. Accomplishments include the following:• Played critical role in several network wide firmware updates for switches and routers• Single handedly rebuilt all network management servers and setup SNMPv3 management for all devices on the network• Designed and implemented several different network upgrades to increase bandwidth, network availability and capacity• Built system for maintaining backups of the entire network infrastructure• Personally got mobile satellite-based communications system working after several others were unsuccessful for months• Created Standard Operating Procedures (SOPs) for securely configuring and installing new network devices• Created and maintained comprehensive access list for all traffic entering and leaving networks• Built VPN networks between firewalls in 6 different locations Show less
-
-
System Administrator
-
Nov 2002 - Nov 2003
Worked for the United States Army Southern Command administering the entire Top Secret SCI network. Maintained all servers for the network and resolved issues that extended beyond the help desk's capabilities. Created tools and scripts to automate tasks for system administrators and help desk personnel. Deploy software packages and updates remotely using Systems Management Server. Accomplishments included the following:• Played a critical role in the migration from Windows Server 2000 to Windows Server 2003 on all servers• Built an intricate script that would do a daily check of all servers and report the status to help streamline morning status checks• Created several scripts to enhance and automate tasks for the System Administration team Show less
-
-
Education
-
Edison State Community College
N/A, Electronics Engineering Technology -
Miami Valley Career Technology Center
N/A, Electronics Engineering Technology