Christopher Becker

Technical Director of Hunt & Content Development at Raytheon Technologies
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Ted Steinhauser

Chris is an insightful and exceptionally gifted computer incident response professional with a tremendous ability to seek out and mitigate those hostile actions of the world’s most notorious cyber adversaries. Truly an expert in analyzing world-class cyber adversary tactics, techniques, and mechanisms facing today’s global IT community, Chris’ technical acumen is unparalleled by his peers and only superseded by his unblemished integrity and unquestionable fidelity. Chris’ efforts and accomplishments are truly a role model for many up and coming information technology professionals and are clearly in keeping with the highest traditions the cyber security profession.

Timothy Rogers

Chris is an extremely talented Forensic Investigator regardless of the target, topic, or problem in hand. I have witnessed Chris’s depth of knowledge in forensic investigations, incident response, eDiscovery and leading a team to success.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • GNFA - GIAC Network Forensic Analyst
    GIAC Certifications
    Apr, 2018
    - Oct, 2024
  • GCFA - GIAC Certified Forensic Analyst
    GIAC Certifications
    Apr, 2017
    - Oct, 2024
  • CISSP - Certified Information Systems Security Professional
    (ISC)²
    May, 2014
    - Oct, 2024
  • GCIH - GIAC Certified Incident Handler
    GIAC
    Oct, 2012
    - Oct, 2024
  • Security+
    CompTIA
    Mar, 2007
    - Oct, 2024
  • AWS Certified Cloud Practitioner
    Amazon Web Services (AWS)
    Oct, 2022
    - Oct, 2024
  • CCE - Certified Computer Examiner
    The International Society of Forensic Computer Examiners® - ISFCE
    Dec, 2011
    - Oct, 2024
  • EnCEP - EnCase Certified eDiscovery Practitioner
    Guidance Software
    Feb, 2011
    - Oct, 2024
  • EnCE - EnCase Certified Examiner
    Guidance Software
    Oct, 2010
    - Oct, 2024

Experience

    • United States
    • Aviation and Aerospace Component Manufacturing
    • 700 & Above Employee
    • Technical Director of Hunt & Content Development
      • Feb 2021 - Present

    • Sr. Threat Hunter/Content Engineer
      • Oct 2020 - Feb 2021

    • Cyber Incident Response
      • Apr 2020 - Oct 2020

    • United States
    • Aviation and Aerospace Component Manufacturing
    • 700 & Above Employee
    • Global Incident Management
      • Apr 2019 - Apr 2020

    • United States
    • Financial Services
    • 700 & Above Employee
    • Information Security Consultant
      • Jan 2015 - Apr 2019

      • Led EDR product selection including evaluations, comparisons, proposals, justifications, and coordinated product deployment. • Managed the EDR platform covering rule creation and deduplication, creation of a custom rule company feed, integrations with threat intelligence platforms, and ingress filtering. • Established the foundation for the Intrusion Hunting program. Developed missions to identify previously undetected intrusions, while also identifying and filling gaps in visibility, detection, alerting, and prevention with creation of new rules and/or recommendations for configuration changes. • Implemented Python-based automation to simplify analyst triage through enrichment of alerts with indicator and attribute lookups via API calls. • Implemented Python-based chat bot modules to support analyst investigations, information collection, and data manipulation. • Supported SOC analysts by responding to alerts, including analysis, containment, remediation, and recovery, and acted as the final SOC escalation point, including rotational 24/7/365 on-call. • Developed alert response procedures for automation and escalation to ensure SOC triage, analysis, containment, and remediation actions were simplified and standardized. • Developed and deployed User Entity Behavior Analytic logic using a tiered risk-based approach where policy violations support threat categories which support threat models. • Evaluated and implemented new EDR and SIEM alerting logic. Supported log correlation, normalization, and parsing to ensure alerts were actionable, concise, and not duplicated across multiple platforms. • Sandboxed malware to evaluate tool visibility, detection, prevention, and alerting coverage. • Developed the Endpoint Security Strategy for the company covering products, gaps, and solution recommendations over the next few years. Show less

    • United States
    • Aviation and Aerospace Component Manufacturing
    • 700 & Above Employee
    • Cyber Security Specialist
      • Dec 2011 - Jan 2015

      • Plank holder of the Incident Response team.• Performed live and dead box forensics including memory, file, registry and event log analysis of devices exhibiting malicious behavior.• Developed host-based monitoring rules to detect malicious software and evidence of lateral movement.• Managed, engineered and implemented rules (Yara, Regex, etc.) for network-based deep packet inspection sensors as well as email sensors.• Well versed in APT Tactics, Techniques, and Procedures (TTPs).• Utilized the SIEM to research malicious activity as well as perform analysis to identify suspicious activity.• Digested and evaluated third party intelligence for applicability and risk to the corporation.• Executed malware in a dynamic virtual environment to determine malicious characteristics to fine-tune monitoring and scanning tools.• Explored new methods of malware detection and protection to increase the security posture of the company, predominantly utilizing the company’s existing tool set.• Provided rotational 24/7 on-call support. Show less

    • Lead Computer Forensic Investigator
      • Sep 2009 - Dec 2011

      • Performed E-Discovery data collections, filters and provisions from individual and enterprise-wide data sources including personal computers, email and network shares.• Lead a collection effort for a $3.2 billion litigation matter involving over 330 custodians.• Conducted ~80 investigations per year on a global scale. Investigative topics included Improper Use of Company Assets, Intellectual Property Theft and Externally Driven Matters.

    • United Kingdom
    • Telecommunications
    • 700 & Above Employee
    • Consultant
      • Feb 2009 - Sep 2009

      • Assisted forensic investigations and E-Discovery tasks including collections and analysis • Designed, validated and maintained the conversion of paper-based trials into dynamic forms with InfoPath 2007 and supported integration with InfoPath Forms Services and SharePoint Server 2007 • Lead the implementation of a HP Blade PC and Thin Client Pilot and assisted on other implementations, including configuration of Active Directory, DHCP, DNS, Folder Redirection and Roaming Profiles, as well as the utilization of Altiris Deployment Solution and a variety of other proprietary technologies • Performed detailed financial analysis of domestic MPLS usage/rates and international telecom spend invoices for consolidation and rate reduction opportunities Show less

    • Information Technology & Services
    • 1 - 100 Employee
    • Associate Consultant
      • Jul 2007 - Feb 2009

    • United States
    • Higher Education
    • 700 & Above Employee
    • Computer Lab Assistant
      • Sep 2003 - May 2007

      Maintained computer labs across campus Maintained computer labs across campus

Education

  • Rensselaer Polytechnic Institute at Hartford
    Master of Business Administration (M.B.A.)
    2011 - 2014
  • Thayer Leadership
    2021 - 2021
  • Roger Williams University
    Bachelor's Degree
    2003 - 2007
  • Torrington High School
    High School
    1999 - 2003

Community

You need to have a working account to view this content. Click here to join now