Charles Riggs

Director / Security Testing at Gotham Digital Science, a Stroz Friedberg company
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
New York, New York, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Director / Security Testing
      • Mar 2018 - Present

    • Technical Penetration Testing Manager
      • Nov 2015 - Present

      Greater New York City Area Manage penetration testing teams in conducting Black Box Application Testing, Source Code Review, Penetration Testing, Embedded Security Testing, Vulnerability Remediation, Social Engineering, CESG (CHECK) IT Health Checks, CBEST/CREST STAR Testing, and Cyber Essentials Certification.

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Manager & Lead Penetration Tester - Cyber Attack Services | Risk Assurance Services
      • Feb 2015 - Nov 2015

      Manage and lead a team of penetration testers to provide penetration testing and security assessments services to fortune 500’s and government agencies - including network and endpoint, wireless, web applications, embedded software, reverse engineering/binary analysis, social engineering, and red team-blue team simulation.

    • Sr. Penetration Tester
      • Feb 2013 - Feb 2015

      Reston, VA Provide penetration testing and security assessments services to fortune 500’s and government agencies - including network and endpoint, wireless, web applications, embedded software, reverse engineering/binary analysis, social engineering, and red team-blue team simulation. Perform application security services including secure development lifecycle integration, cyber threat modeling, application risk profiling, application security architecture review, and static and dynamic source… Show more Provide penetration testing and security assessments services to fortune 500’s and government agencies - including network and endpoint, wireless, web applications, embedded software, reverse engineering/binary analysis, social engineering, and red team-blue team simulation. Perform application security services including secure development lifecycle integration, cyber threat modeling, application risk profiling, application security architecture review, and static and dynamic source code analysis. Perform Forensics and incident response services including computer forensic imaging and analysis, malware analysis and triage, on-demand incident response and Computer Emergency Response Team (CERT) program support. -Web Application SME -Evaluate the security posture of public and private sector organizations -Regularly complete Internal, External, Web Application, Social Engineering and Firewall assessments -Test security control application and actual output verses desired output -Validate subject to object based authentication and authorizations of business and mission systems -Assess potential vulnerabilities and validated the presence within targets architecture -Document qualitative risks associated with findings discovered during security posture analysis -Produce targeted Executive Summaries for Chief Suite (C-Suite) personnel -Conduct briefings with business leadership to validate scope(s), objective(s) and desired results -Depict step-by-step exploitation of an organization within a Security Posture and Analysis (SPA) -Score all findings with either CVSSv2 or DREAD scoring systems -Produce summaries of findings and the affected locations, assets and or hosts -Document Proofs of Concept that provided examples of exploitation -Develop organizational specific mitigation plans for each finding -Utilize a variety of Penetration Testing and Vulnerability Analysis tools and methodologies

    • Senior Security Analyst - Pentagon Computer Incident Response (PENTCIRT))
      • Sep 2012 - Feb 2013

      Arlington, VA Provide active customers with a defensible and survivable infrastructure utilizing a robust defense in depth architecture with capabilities to protect, monitor, and respond to network attacks and incursions. Focusing specifically on intrusion set related activity, the detection and mitigation of APT targeted attacks - including network and system forensics, complete reverse engineering of designer malcode, threat modeling, advanced IDPS signature & SIEM correlation rule development, Pentesting… Show more Provide active customers with a defensible and survivable infrastructure utilizing a robust defense in depth architecture with capabilities to protect, monitor, and respond to network attacks and incursions. Focusing specifically on intrusion set related activity, the detection and mitigation of APT targeted attacks - including network and system forensics, complete reverse engineering of designer malcode, threat modeling, advanced IDPS signature & SIEM correlation rule development, Pentesting (white & black box), and security stack engineering. -Utilize both active and passive security measures. Active measures include multiple layers of firewalls, Intrusion Protection Systems (IPS) and border Access Control Lists (ACL). Passive measures include both signature and anomaly Intrusion Detection Systems (IDS), and traffic flow analysis. -Provide a rapid response and containment of network incursions. -Develop and provide security awareness and training, IA assessment visits, vulnerability assessment & analysis, penetration testing, risk assessments of software and hardware, policy review, and research and analysis of the threat posed to the Pentagon network backbone and customers. -Sustain ITA security posture by following the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) accreditation process as well as the DISA and CJCS connection approval policies, and complying with the DoD and Army Information Assurance Vulnerability Management program. Show less

    • Canada
    • Banking
    • 700 & Above Employee
    • Cyber-Threat Intel & Analytics, VP
      • Sep 2011 - Sep 2012

      Greenville, South Carolina Area Cyber-Threat Intel & Analytics: research, initiate, and accelerate internal ability of Info Systems teams to defend against Internet-scale threats by delivering technology (tools, rules, signatures, and enterprise wide event correlation) Web application and network penetration testing, network and system forensics, malware reversing and analysis, CIRT Team member and incident responder.

    • Senior Intrusion Analyst - Department of Energy NNSA
      • Jan 2010 - Sep 2011

      Senior Level Intrusion Analyst in major security operations center for secure government installations and research

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Information Assurance Engineer
      • Feb 2009 - Jan 2010

      St. George, Utah Built and managed security processes and supporting tools to support evaluation and monitoring of IT risk management including risks related to: -Strategic projects / initiatives * both customer facing and internally focused. -New areas of business and/or emerging technologies. -Acquisitions and divestitures. -Customer and vendor management. Built and managed processes and supporting tools to support evaluation and monitoring of IT compliance * focusing initially in… Show more Built and managed security processes and supporting tools to support evaluation and monitoring of IT risk management including risks related to: -Strategic projects / initiatives * both customer facing and internally focused. -New areas of business and/or emerging technologies. -Acquisitions and divestitures. -Customer and vendor management. Built and managed processes and supporting tools to support evaluation and monitoring of IT compliance * focusing initially in implementing a framework around the ISO 27001 security standard, and then incorporating other existing compliance areas such as PCI, SOX, HIPAA etc. Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Senior Security Analyst
      • Sep 2008 - Feb 2009

      Greater Salt Lake City Area -Performed installation and configuration management of security systems and applications, including policy assessment and compliance tools, network security appliances and host-based security systems. -Performed threat and vulnerability assessments to ensure that systems are protected against known and potential threats and are free from known vulnerabilities. -Applied patches, removed known weaknesses, such as unnecessary services or applications or redundant user accounts, as… Show more -Performed installation and configuration management of security systems and applications, including policy assessment and compliance tools, network security appliances and host-based security systems. -Performed threat and vulnerability assessments to ensure that systems are protected against known and potential threats and are free from known vulnerabilities. -Applied patches, removed known weaknesses, such as unnecessary services or applications or redundant user accounts, as a means of hardening systems in accordance with security policies, standards and industry best practices. -Researched threats and vulnerabilities and took action to mitigate threats and remediate vulnerabilities. -Developed and lead response efforts and follow up on security events reported by SIEM tools or in system and event logs. -Collated security incident and event data, unresolved network security exposures, and audit remediation to produce monthly exception and management reports. Show less

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Network Security Engineer
      • Mar 2007 - Sep 2008

      St. George, Utah -Performed proof of concept testing and validation of network security design. -Engineered security solutions and standards based on requirements, best practices, and technical knowledge. -Developed detailed designs using best of breed security equipment including firewalls, intrusion prevention systems, and secure access control systems. -Implemented, supported, maintained and monitored the security configuration of firewalls, VPN devices, routers, switches, wireless access… Show more -Performed proof of concept testing and validation of network security design. -Engineered security solutions and standards based on requirements, best practices, and technical knowledge. -Developed detailed designs using best of breed security equipment including firewalls, intrusion prevention systems, and secure access control systems. -Implemented, supported, maintained and monitored the security configuration of firewalls, VPN devices, routers, switches, wireless access points, and IDS/IPS devices for stability, reliability scalability and compliance with security and regulatory requirements. -Provided third level technical support and troubleshooting. -Provided network traffic analysis to diagnose and resolve issues. -Performed network and systems forensic investigations. Show less

    • Systems Security Engineer
      • May 2005 - Mar 2007

      Greater Salt Lake City Area/St. George, Utah -Engineered security solutions and exposed WLAN/LAN vulnerabilities. -Pen. tested external networks, audited internal network including server and endpoint security. -Implemented solutions - Firewall installation, WAN access, authentication systems including RSA tokens, endpoint security (firewall & virus/malware). -Engineered Microsoft Server/Client network systems (migrated Windows 2000 to 2003). -Planned, designed, implemented LAN networks and enterprise… Show more -Engineered security solutions and exposed WLAN/LAN vulnerabilities. -Pen. tested external networks, audited internal network including server and endpoint security. -Implemented solutions - Firewall installation, WAN access, authentication systems including RSA tokens, endpoint security (firewall & virus/malware). -Engineered Microsoft Server/Client network systems (migrated Windows 2000 to 2003). -Planned, designed, implemented LAN networks and enterprise security. -Maintained LAN/WLAN/WAN security and monitored network performance. -Developed policies, procedures, and resources to standardize the functioning of the networks. -Kept up-to-date documentation of overall network health and anomalous traffic. -Responsible for disaster recovery and business continuity plan development and testing for networks. -Enforced IT standards and educated employees about compliance issues. -Interfaced directly with clients to ensure networks are secure yet maintain functionality. -Provided guidance and training to other team members. -Evaluated critical systems, prioritized work, and determined applicable solutions. -Advanced knowledge of subnetting, routing, switching, Voice and Video. -Knowledge of Cisco device and application administration, including but not limited to routers, switches, WAPs, bridges, Pix firewall, VPN concentrator and ACS servers. Show less

    • Network Administrator
      • Jun 2002 - Oct 2003

      Ogden, Utah -Supported 20,000 users on 400 separate networks and subnets. -Managed Base wide workstation updates & security patch rollouts. -Solved endpoint technical issues using Tivoli as a remote control tool. -Preserved user email accounts on over 20 MS Exchange servers - regulating server connectivity, hard disk utilization and reporting metrics. -Implemented a new trouble ticket system using dual redundant Windows 2000 SQL servers, using Remedy and replacing an outdated Access… Show more -Supported 20,000 users on 400 separate networks and subnets. -Managed Base wide workstation updates & security patch rollouts. -Solved endpoint technical issues using Tivoli as a remote control tool. -Preserved user email accounts on over 20 MS Exchange servers - regulating server connectivity, hard disk utilization and reporting metrics. -Implemented a new trouble ticket system using dual redundant Windows 2000 SQL servers, using Remedy and replacing an outdated Access database system. -Increased technical response time by allowing end users to submit their own trouble tickets Show less

    • Software Development
    • 1 - 100 Employee
    • Unix Systems Engineer
      • Jan 2002 - Jun 2002

      Salt Lake City, Utah -Deploy and install IBM RISC servers onsite to Credit Union customers throughout the US, interfacing directly with clients. -AIX 4.3 – 5.1 is installed with a bouquet of software that runs every aspect of the credit union computer systems. Configure Samba, NFS, ODBC services. Manage SCO servers. Install company developed software that runs 24 hour phone automation software. -Configure Cisco routers for customers WAN’s from branch to branch and to the Internet. Deploy Linux… Show more -Deploy and install IBM RISC servers onsite to Credit Union customers throughout the US, interfacing directly with clients. -AIX 4.3 – 5.1 is installed with a bouquet of software that runs every aspect of the credit union computer systems. Configure Samba, NFS, ODBC services. Manage SCO servers. Install company developed software that runs 24 hour phone automation software. -Configure Cisco routers for customers WAN’s from branch to branch and to the Internet. Deploy Linux servers, SUSE and RedHat 8.0 on standard Intel machines. -Assisted in the design and schemes of future products. Show less

    • Telecommunications
    • 1 - 100 Employee
    • Server Administrator
      • Apr 1999 - Jan 2002

      Greater Salt Lake City Area -Accountable for Five Corporate Windows 2000 Domains. (Workstations, Servers, Active Directory Objects). -Responsible for the migration of Windows NT to Windows 2000 - Over 4,000 desktops, laptops and servers. -Maintain the western territory Active Directory - Configured all security policies during Windows 2000 rollout. -Supported an extensive list of operating systems and configurations (NT, XP, 2000, 98, 95, 3.1) Linux & Unix experience (Red Hat, Solaris, HP-UX) Supported SAMBA… Show more -Accountable for Five Corporate Windows 2000 Domains. (Workstations, Servers, Active Directory Objects). -Responsible for the migration of Windows NT to Windows 2000 - Over 4,000 desktops, laptops and servers. -Maintain the western territory Active Directory - Configured all security policies during Windows 2000 rollout. -Supported an extensive list of operating systems and configurations (NT, XP, 2000, 98, 95, 3.1) Linux & Unix experience (Red Hat, Solaris, HP-UX) Supported SAMBA Services for printing. Supported 60+ servers, IIS 4.0, NT & 2000: Domain Controllers, file servers & Exchange servers. Lotus Notes server Administration and implementation (Domino Server, R5 client and server side, & all user accounts). -Maintain Cisco routers, switches & hubs. -Saved the company from a very possible large and costly email disaster by detecting malicious software within the email system. Show less

Education

  • ISC2
    CISSP, Information Security
  • SANS
    SEC503 Intrusion Detection & SEC542 Web based Pen Testing & Exploitation

Community

You need to have a working account to view this content. Click here to join now