David Shen, CCSP
Cyber Security Analyst II at Texas Higher Education Coordinating Board- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
Texas Higher Education Coordinating Board
-
United States
-
Higher Education
-
200 - 300 Employee
-
Cyber Security Analyst II
-
May 2022 - Present
Austin, Texas, United States • Established and administrated several new locally and Azure Cloud hosted cybersecurity infrastructure tools including intrusion prevention system (IPS), security information and event management (SIEM), vulnerability scanners (Qualys and Tenable), and Microsoft conditional access policies to follow zero trust principles. • Team lead for security participating in SecDevOps process to migrate over 35 critical apps into Azure cloud. • Independently migrated all cloud log sources and added… Show more • Established and administrated several new locally and Azure Cloud hosted cybersecurity infrastructure tools including intrusion prevention system (IPS), security information and event management (SIEM), vulnerability scanners (Qualys and Tenable), and Microsoft conditional access policies to follow zero trust principles. • Team lead for security participating in SecDevOps process to migrate over 35 critical apps into Azure cloud. • Independently migrated all cloud log sources and added new log sources from locally hosted tools from Microsoft Sentinel SIEM to IBM QRadar SIEM for cost savings. • Responsible for completing penetration tests within compressed timelines for apps before deployment to production in Azure cloud. Responsible for conducting vulnerability scans and working directly with teams on remediation for over 220 locally and cloud hosted assets, eliminating over 800 total vulnerabilities in first year. • Revamped monthly email phishing simulations using Sophos tool for email security leading to 34% less clicks on phishing links. • Presented phishing training course to whole agency including a live demonstration showing ease of setting up an online fake login page that captured entered credentials, creating a phishing email using Social Engineering Toolkit and sending the email using a spoofed email account using anonymous email. • Developed an interactive custom risk calculator based on various components to determine accurate risk rating for apps. • Authored all modern security policy and procedures to follow zero trust principles. Show less
-
-
-
Texas Workforce Commission
-
Government Administration
-
700 & Above Employee
-
Cyber Security Analyst
-
Dec 2020 - May 2022
Austin, Texas, United States • Administrated and maintained all cybersecurity infrastructure including intrusion prevention system (McAfee IPS and TrendMicro TippingPoint), security information and event management (Splunk, McAfee, and Microsoft Sentinel SIEMs), data loss prevention (McAfee DLP, and Microsoft DLP), Web Proxy (McAfee Web Gateway), Network monitoring and compliance (Gigamon, and Firemon), vulnerability scanners (Tenable) and Endpoint security anti-virus (Microsoft Security Center Suite) used to protect the… Show more • Administrated and maintained all cybersecurity infrastructure including intrusion prevention system (McAfee IPS and TrendMicro TippingPoint), security information and event management (Splunk, McAfee, and Microsoft Sentinel SIEMs), data loss prevention (McAfee DLP, and Microsoft DLP), Web Proxy (McAfee Web Gateway), Network monitoring and compliance (Gigamon, and Firemon), vulnerability scanners (Tenable) and Endpoint security anti-virus (Microsoft Security Center Suite) used to protect the whole agency and satellite sites. • Created and presented 18 live interactive escape room style training sessions to over 50 members during October’s Cybersecurity month. Presented agency wide Cybersecurity Awareness Clinic training to over 100 agency members. • Performed quarterly penetration tests and vulnerability scans for agency network and applications using Metasploit, Burp Suite, Tenable, and Kali Linux tools. Started monthly email phishing simulations for email security resulting in 12% less clicks on phishing links. • Configured, monitor, analyzed, and remediated security alerts for potential compromise from cybersecurity tools, network devices, and information systems. • Developed and authored policies and procedures for workflows to streamline web traffic / website filtering through Web Proxy across all divisions saving time through decreased tickets and increasing satisfaction and efficiency throughout the agency. Show less
-
-
-
PwC
-
Professional Services
-
700 & Above Employee
-
Experienced Associate - Cybersecurity, Privacy & Forensics
-
Feb 2019 - Dec 2020
Austin, Texas • Developed a 3 year security roadmap for a Fortune 500 IT services company looking to improve their IAM deployment. Led 32 interviews of C level executives and highly technical teams, conducted a cost/feature analysis of five IAM products, and evaluation of the clients use cases and needs resulting in the recommendation of IAM and PAM tool consolidation. • Performed a security evaluation on the infrastructure at a startup healthcare company based on the NIST cybersecurity framework… Show more • Developed a 3 year security roadmap for a Fortune 500 IT services company looking to improve their IAM deployment. Led 32 interviews of C level executives and highly technical teams, conducted a cost/feature analysis of five IAM products, and evaluation of the clients use cases and needs resulting in the recommendation of IAM and PAM tool consolidation. • Performed a security evaluation on the infrastructure at a startup healthcare company based on the NIST cybersecurity framework. Responsible for leading 23 interviews with directors and C level executives to understand the future plans of growth and constructed a multi-year roadmap to improve the overall security posture. • Authored articles for a weekly email newsletter named Cybersecurity on the Fly providing quick summaries of cybersecurity incidents and emerging threats occurring over the week. • Produced and pitched a proposal to a panel of three directors to upskill the cyber defense practice within PwC in Docker/containerization technology • Designed a 3-year roadmap for a Fortune 500 health care company looking to improve the security of their application intake process. Responsible for conducting interviews for an end to end process assessment spanning 17 unique teams resulting in recommendation to store vulnerability assessments in a consolidated location for efficient sharing of data for teams. • Assisted a Fortune 100 media company update their governance, risk, and compliance (GRC) policies and procedures. Responsible for developing a tool that used CMDB attributes to help a client prioritize their assets for compliance review. Show less
-
-
-
IBM
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
IBM Security Access and Federated Identity Management Support
-
Sep 2014 - Feb 2019
Austin, Texas Area • Level 2 Technical Support for IBM Security Access Manager (ISAM) for Primarily Americas Region and Worldwide production issues. • Worked directly with customers to collect/review HTTP and TCP/IP traces to determine root cause and find solutions for various defects and configuration issues. Work directly with customers on migration and upgrade projects on large clustered ISAM environments. • Presented live technical training sessions to over 440 global customers, saving support more… Show more • Level 2 Technical Support for IBM Security Access Manager (ISAM) for Primarily Americas Region and Worldwide production issues. • Worked directly with customers to collect/review HTTP and TCP/IP traces to determine root cause and find solutions for various defects and configuration issues. Work directly with customers on migration and upgrade projects on large clustered ISAM environments. • Presented live technical training sessions to over 440 global customers, saving support more than $64,800. • Worked at SXSW technical conference representing IBM demonstrating Security Operation Center simulation for Watson Security – Corporate Security to more than 3600 people. • Led four internal team training sessions over two Java classes used for connecting applications to the ISAM Policy Server, One Time Password mechanisms, and Federation flows. • Authored Technical Notes for common issues regarding ISAM that decreased time for resolution of issues. • Work directly with ISAM Level 3 support teams to determine and correct code defects in ISAM. • Installed and configured 50 RHEL lab machines on VMware ESX server and Workstation for team use. • Handled four on call weeks per year for all customer production outages. • Assisted with testing new biometric authentication features for major ISAM version release. • Mentored new team members on analyzing HTTP traffic and network traces for solving issues with ISAM. Show less
-
-
-
-
Security Researcher
-
May 2013 - Feb 2014
Dallas Investigate, identify, and document software vulnerabilities and its causes and impacts Participate in scrum and leverage Agile methodology in six person team for project execution Present vulnerability spotlight features to the company on a monthly basis Summarize and author abstracts about existing software vulnerabilities from various sources
-
-
Education
-
The University of Texas at Dallas
Electrical Engineering, Electrical and Electronics Engineering