Chase Bertke
CEO, Vulnerability Researcher, and Co-Founder at Dark Circuit Labs- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
0
/5.0 / Based on 0 ratingsFilter reviews by:
Experience
-
Dark Circuit Labs
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
CEO, Vulnerability Researcher, and Co-Founder
-
May 2021 - Present
Washington DC-Baltimore Area
-
-
-
BLS Government Services
-
Computer and Network Security
-
1 - 100 Employee
-
Principal Researcher
-
May 2019 - Apr 2021
Arlington, Virginia
-
-
-
Draper
-
Advertising Services
-
Vulnerability Researcher
-
Jul 2017 - Jul 2019
-
-
-
Parsons Corporation
-
United States
-
Professional Services
-
700 & Above Employee
-
Security Researcher
-
Jul 2016 - Jul 2017
-
-
-
Blue Canopy
-
United States
-
Penetration Tester
-
2015 - Jul 2016
-
-
-
Hewlett-Packard
-
United States
-
Information Technology & Services
-
300 - 400 Employee
-
Penetration Tester
-
2014 - Sep 2015
Position Summary: To perform Penetration Tests and Vulnerability Assessments in order to provide an offensive security perspective while mimicking an actual threat. • Ability to conduct Penetration Tests and Vulnerability Assessments using automated and manual tactics, techniques, and procedures • Understanding of common Web Application Vulnerabilities like SQLi, XSS, and CSRF • Perform exploitation development techniques on networking protocols to identify new and unknown… Show more Position Summary: To perform Penetration Tests and Vulnerability Assessments in order to provide an offensive security perspective while mimicking an actual threat. • Ability to conduct Penetration Tests and Vulnerability Assessments using automated and manual tactics, techniques, and procedures • Understanding of common Web Application Vulnerabilities like SQLi, XSS, and CSRF • Perform exploitation development techniques on networking protocols to identify new and unknown vulnerabilities • Proficiency with Metasploit, Burp Suite, Nmap, Scapy, and other tools used in the Kali distribution • Familiarity with Network and System architectures analysis to include: network routing and switching • Brief executive summary and findings to stakeholders and leadership • Understanding of how to create unique exploit code, bypass antivirus, and mimic adversarial threats • Help customers perform analysis and mitigation of security vulnerabilities • Research and maintain proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities and network security • Practice Reverse Engineering closed source binary files looking for vulnerabilities Show less
-
-
-
Accuvant
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Security Analyst
-
Mar 2014 - Aug 2014
Position Summary: To act as a senior leadership role for other analysts while providing incident response and security posture for multiple clients. • Working in a 24/7 Security Operations Center that has multiple clients across the United States and world wide providing Incident Response and root cause investigations expertise to all clients across many security platforms. • Monitoring and investigation of security events that happen in multiple customer environments using… Show more Position Summary: To act as a senior leadership role for other analysts while providing incident response and security posture for multiple clients. • Working in a 24/7 Security Operations Center that has multiple clients across the United States and world wide providing Incident Response and root cause investigations expertise to all clients across many security platforms. • Monitoring and investigation of security events that happen in multiple customer environments using ArcSight, Nitro, QRadar and FireEye. • Work on the file systems and in command line (Bash) on various security appliances to assist with bringing systems back online after they have gone down. • Incident response and deep dive investigations for client high priority issues to include DDoS investigations, malware analysis, active intruder in the network, brute force attacks etc. • Working with the clients in order to white list unwanted traffic and better setup the rules and systems in the environments to serve the needs of the clients. • Assisted with many different types of network security compliance to include PCI, HIPPA etc. Show less
-
-
-
Navy Federal Credit Union
-
United States
-
Financial Services
-
700 & Above Employee
-
Information Security Specialist
-
Nov 2013 - Apr 2014
To provide technical support to monitor, maintain, analyze and evaluate enterprise information security architecture, policies, procedures and tools, and identify effectiveness of current security programs to meet risk challenges. To protect Navy Federal information systems assets, detect and resolve exposures, and ensure secured member and employee access, information integrity and minimization of financial risk
-
-
Network Operator
-
Feb 2013 - Oct 2013
Vienna, Virginia To monitor Navy Federals enterprise systems and network to ensure continuous availability. To troubleshoot, resolve and escalate incidents and problems when detected. To interface with vendors and ensure appropriate resolution during system outages or periods of reduced performance. To perform routine tests and maintenance of assigned systems, networks and peripheral equipment.
-
-
Education
-
Stone Bridge High school