Dave Loftus
Information Security Analyst at Imply- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
Imply
-
United States
-
Software Development
-
100 - 200 Employee
-
Information Security Analyst
-
Nov 2022 - Present
-
-
-
Pfizer
-
United States
-
Pharmaceutical Manufacturing
-
700 & Above Employee
-
Senior Security Automation Engineer & Technical Lead
-
Dec 2019 - Mar 2022
This role was a Senior Security Automation Developer with Pfizer’s Global Information Security Team. Responsibilities included: ◦ Engineering solutions to ensure compliance with data loss prevention policies ◦ Compliance driven collection of mobile application data sent within the APAC region; this project required Python bindings to C libraries, Splunk, Docker, Zookeeper, and Elastic ◦ Administering a Security Orchestration, Automation, and Response… Show more This role was a Senior Security Automation Developer with Pfizer’s Global Information Security Team. Responsibilities included: ◦ Engineering solutions to ensure compliance with data loss prevention policies ◦ Compliance driven collection of mobile application data sent within the APAC region; this project required Python bindings to C libraries, Splunk, Docker, Zookeeper, and Elastic ◦ Administering a Security Orchestration, Automation, and Response (SOAR) platform ◦ Providing automation support to incident response, threat intelligence, and insider threat teams ◦ Conducting code reviews ◦ Modernizing legacy infrastructure & engineering practices ◦ Assisting management and mentoring team members Show less This role was a Senior Security Automation Developer with Pfizer’s Global Information Security Team. Responsibilities included: ◦ Engineering solutions to ensure compliance with data loss prevention policies ◦ Compliance driven collection of mobile application data sent within the APAC region; this project required Python bindings to C libraries, Splunk, Docker, Zookeeper, and Elastic ◦ Administering a Security Orchestration, Automation, and Response… Show more This role was a Senior Security Automation Developer with Pfizer’s Global Information Security Team. Responsibilities included: ◦ Engineering solutions to ensure compliance with data loss prevention policies ◦ Compliance driven collection of mobile application data sent within the APAC region; this project required Python bindings to C libraries, Splunk, Docker, Zookeeper, and Elastic ◦ Administering a Security Orchestration, Automation, and Response (SOAR) platform ◦ Providing automation support to incident response, threat intelligence, and insider threat teams ◦ Conducting code reviews ◦ Modernizing legacy infrastructure & engineering practices ◦ Assisting management and mentoring team members Show less
-
-
-
Kayod
-
Asia Pacific
-
Founder & Lead Engineer
-
Oct 2017 - Dec 2019
As the founder and lead engineer, these roles included managing, marketing, and creating: * A Yara based endpoint security product that alerted clients about files containing sensitive data & measured the length of exposure over time * A GPS, WiFi & Cellular based mapping service * A charitable, employment based advertising platform tailored to the Republic of the Philippines As the founder and lead engineer, these roles included managing, marketing, and creating: * A Yara based endpoint security product that alerted clients about files containing sensitive data & measured the length of exposure over time * A GPS, WiFi & Cellular based mapping service * A charitable, employment based advertising platform tailored to the Republic of the Philippines
-
-
-
Arbor Networks
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Security Research Analyst
-
Jan 2013 - Aug 2017
This role was a Security Research Analyst on Arbor's Security Engineering & Response Team (ASERT). Responsibilities included: * Reverse engineering malware, malware classification * Contributing to the company's malware analysis infrastructure development * Malware sinkhole development * Product feed contributions * Researching DDoS related threats & developing mitigations * Producing research & intelligence products for customers * Briefing media & responding to… Show more This role was a Security Research Analyst on Arbor's Security Engineering & Response Team (ASERT). Responsibilities included: * Reverse engineering malware, malware classification * Contributing to the company's malware analysis infrastructure development * Malware sinkhole development * Product feed contributions * Researching DDoS related threats & developing mitigations * Producing research & intelligence products for customers * Briefing media & responding to law enforcement inquiries * Point-of-contact for an ISAC * Understanding threat-actor TTPs & providing attribution to campaigns * Contributing to working groups & the security community * Researching new malware families, criminal, and state-sponsored campaigns * Presenting at private conferences Show less This role was a Security Research Analyst on Arbor's Security Engineering & Response Team (ASERT). Responsibilities included: * Reverse engineering malware, malware classification * Contributing to the company's malware analysis infrastructure development * Malware sinkhole development * Product feed contributions * Researching DDoS related threats & developing mitigations * Producing research & intelligence products for customers * Briefing media & responding to… Show more This role was a Security Research Analyst on Arbor's Security Engineering & Response Team (ASERT). Responsibilities included: * Reverse engineering malware, malware classification * Contributing to the company's malware analysis infrastructure development * Malware sinkhole development * Product feed contributions * Researching DDoS related threats & developing mitigations * Producing research & intelligence products for customers * Briefing media & responding to law enforcement inquiries * Point-of-contact for an ISAC * Understanding threat-actor TTPs & providing attribution to campaigns * Contributing to working groups & the security community * Researching new malware families, criminal, and state-sponsored campaigns * Presenting at private conferences Show less
-
-
-
Southern Illinois University, Carbondale
-
United States
-
Higher Education
-
700 & Above Employee
-
Incident Responder
-
Jun 2008 - Aug 2012
This role was working as an Incident Responder in the Information Security Department at Southern Illinois University Carbondale. Responsibilities Included: * Identifying, containing, and monitoring the remediation of malware infections * Working with departments to implement best security practices * Developing a DNS-based sensor network to identify malware traffic * Creating infrastructure to detect malware traffic signatures from third-party feeds * Developing a… Show more This role was working as an Incident Responder in the Information Security Department at Southern Illinois University Carbondale. Responsibilities Included: * Identifying, containing, and monitoring the remediation of malware infections * Working with departments to implement best security practices * Developing a DNS-based sensor network to identify malware traffic * Creating infrastructure to detect malware traffic signatures from third-party feeds * Developing a passive DNS database * Forensic analysis of compromised devices * Reverse engineering malware * Identity management & compliance audits * Responding to law enforcement inquiries * Contributing to the TDL working group * Developing an endpoint security product Show less This role was working as an Incident Responder in the Information Security Department at Southern Illinois University Carbondale. Responsibilities Included: * Identifying, containing, and monitoring the remediation of malware infections * Working with departments to implement best security practices * Developing a DNS-based sensor network to identify malware traffic * Creating infrastructure to detect malware traffic signatures from third-party feeds * Developing a… Show more This role was working as an Incident Responder in the Information Security Department at Southern Illinois University Carbondale. Responsibilities Included: * Identifying, containing, and monitoring the remediation of malware infections * Working with departments to implement best security practices * Developing a DNS-based sensor network to identify malware traffic * Creating infrastructure to detect malware traffic signatures from third-party feeds * Developing a passive DNS database * Forensic analysis of compromised devices * Reverse engineering malware * Identity management & compliance audits * Responding to law enforcement inquiries * Contributing to the TDL working group * Developing an endpoint security product Show less
-
-
-
Southern Illinois University, Carbondale
-
United States
-
Higher Education
-
700 & Above Employee
-
Research Contract
-
2006 - 2007
This work involved contributing to the development of a Palm Pilot application used by clinical researchers at Southern Illinois University. The application enabled researchers to monitor and record behavioral interactions between members of at-risk communities. This software was used to support a long-standing study at the university.
-
-
Research Contract
-
2006 - 2007
This position involved contributing to the development of a communication paradigm for unmanned aerial vehicles under a research contract.
-
-
-
Terry's Computer Shack
-
Mendota, Illinois, United States
-
Employee
-
2004 - 2005
This role consisted of repairing and assmbling computers, removing malware infections, selling cellular phones, assisting customers, and installing satellite dishes in the Mendota, Illinois & surrounding area. This role consisted of repairing and assmbling computers, removing malware infections, selling cellular phones, assisting customers, and installing satellite dishes in the Mendota, Illinois & surrounding area.
-
-
Education
-
Southern Illinois University, Carbondale