Topline Score

Bio

Generated by
Topline AI

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.
You need to have a working account to view this content. Click here to join now

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • CEO, Vulnerability Researcher, and Co-Founder
      • May 2021 - Present

      Washington DC-Baltimore Area

    • Computer and Network Security
    • 1 - 100 Employee
    • Principal Researcher
      • May 2019 - Apr 2021

      Arlington, Virginia

    • Advertising Services
    • Vulnerability Researcher
      • Jul 2017 - Jul 2019
    • United States
    • Professional Services
    • 700 & Above Employee
    • Security Researcher
      • Jul 2016 - Jul 2017
    • United States
    • Penetration Tester
      • 2015 - Jul 2016
    • United States
    • Information Technology & Services
    • 300 - 400 Employee
    • Penetration Tester
      • 2014 - Sep 2015

      Position Summary: To perform Penetration Tests and Vulnerability Assessments in order to provide an offensive security perspective while mimicking an actual threat. • Ability to conduct Penetration Tests and Vulnerability Assessments using automated and manual tactics, techniques, and procedures • Understanding of common Web Application Vulnerabilities like SQLi, XSS, and CSRF • Perform exploitation development techniques on networking protocols to identify new and unknown… Show more Position Summary: To perform Penetration Tests and Vulnerability Assessments in order to provide an offensive security perspective while mimicking an actual threat. • Ability to conduct Penetration Tests and Vulnerability Assessments using automated and manual tactics, techniques, and procedures • Understanding of common Web Application Vulnerabilities like SQLi, XSS, and CSRF • Perform exploitation development techniques on networking protocols to identify new and unknown vulnerabilities • Proficiency with Metasploit, Burp Suite, Nmap, Scapy, and other tools used in the Kali distribution • Familiarity with Network and System architectures analysis to include: network routing and switching • Brief executive summary and findings to stakeholders and leadership • Understanding of how to create unique exploit code, bypass antivirus, and mimic adversarial threats • Help customers perform analysis and mitigation of security vulnerabilities • Research and maintain proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities and network security • Practice Reverse Engineering closed source binary files looking for vulnerabilities Show less

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Security Analyst
      • Mar 2014 - Aug 2014

      Position Summary: To act as a senior leadership role for other analysts while providing incident response and security posture for multiple clients. • Working in a 24/7 Security Operations Center that has multiple clients across the United States and world wide providing Incident Response and root cause investigations expertise to all clients across many security platforms. • Monitoring and investigation of security events that happen in multiple customer environments using… Show more Position Summary: To act as a senior leadership role for other analysts while providing incident response and security posture for multiple clients. • Working in a 24/7 Security Operations Center that has multiple clients across the United States and world wide providing Incident Response and root cause investigations expertise to all clients across many security platforms. • Monitoring and investigation of security events that happen in multiple customer environments using ArcSight, Nitro, QRadar and FireEye. • Work on the file systems and in command line (Bash) on various security appliances to assist with bringing systems back online after they have gone down. • Incident response and deep dive investigations for client high priority issues to include DDoS investigations, malware analysis, active intruder in the network, brute force attacks etc. • Working with the clients in order to white list unwanted traffic and better setup the rules and systems in the environments to serve the needs of the clients. • Assisted with many different types of network security compliance to include PCI, HIPPA etc. Show less

    • United States
    • Financial Services
    • 700 & Above Employee
    • Information Security Specialist
      • Nov 2013 - Apr 2014

      To provide technical support to monitor, maintain, analyze and evaluate enterprise information security architecture, policies, procedures and tools, and identify effectiveness of current security programs to meet risk challenges. To protect Navy Federal information systems assets, detect and resolve exposures, and ensure secured member and employee access, information integrity and minimization of financial risk

    • Network Operator
      • Feb 2013 - Oct 2013

      Vienna, Virginia To monitor Navy Federals enterprise systems and network to ensure continuous availability. To troubleshoot, resolve and escalate incidents and problems when detected. To interface with vendors and ensure appropriate resolution during system outages or periods of reduced performance. To perform routine tests and maintenance of assigned systems, networks and peripheral equipment.

Education

  • Stone Bridge High school

Community

You need to have a working account to view this content. Click here to join now