Topline Score

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

You need to have a working account to view this content. Click here to join now
Carl Herberger

I had the tremendous good fortune in having Dante cross my professional path at Evolve IP and have been an incredibly better person ever since. Dante is a extraordinary person in numerous ways, however one can rely on his proactivity, honesty, earnest will and ability to execute. He is incedibly fun to be around, technically very bright and has a passion for all things related to information security. Dante is also an eager learner, a dedicated friend and a loyal employee. As a kind and generous person to be around and very situationally aware and atuned to customer's needs, Dante is a phenominal resource to be part of any team. It brings me GREAT pleasure to recommend Dante as an active team member to any technical team!

Kevin Cameron

Dante is quite passionate about technology, he strives to always be on the cutting edge and to use his knowledge to make decisions that benefit his clients today and in the future. I have had the opportunity to watch Dante's carer evolve and I can say I rarely see the level of dedication he pours into his career, his science, and his clients. He is a true professional, to rely on for your business needs today, and your solutions tomorrow. I highly recommend him.

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.
You need to have a working account to view this content. Click here to join now

Credentials

  • GIAC Certified Incident Handler (GCIH)
    GIAC Certifications
  • GIAC Certified Penetration Tester (GPEN)
    GIAC Certifications

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Red Team Lead
      • Jul 2021 - Present

      FusionX helps our customers manage cyber risk through a variety of services geared towards minimizing exposure and maximizing return on investment. Our best in class technical assessment teams will target your information assets using the highly tailored tactics, techniques and procedures (TTP’s) of your most likely attackers – resulting in an assessment which will provide a true evaluation of the resiliency of your enterprise to a real attack. FusionX prides itself on a strong culture of bleeding-edge security research and on consistently identifying vulnerabilities that our competitors miss. Our clients engage us to model and replicate sophisticated adversary attacks, manage and respond to critical incidents, and improve their overall cyber risk management program. Show less

    • United States
    • Business Consulting and Services
    • 700 & Above Employee
    • Associate Director, Attack & Penetration Testing
      • Jan 2019 - Jul 2021

    • Sr. Manager, Penetration Testing and Red Team Operations
      • Feb 2017 - Dec 2018

    • India
    • Security and Investigations
    • 1 - 100 Employee
    • Senior Manager, Security Consulting Services
      • Mar 2015 - Feb 2017
    • Manager
      • Jul 2013 - Mar 2015

    • Senior Consultant, IT Security & Privacy Management
      • Jan 2011 - Jul 2013

    • United States
    • IT Services and IT Consulting
    • 100 - 200 Employee
    • Information Security Solutions Engineer
      • Apr 2010 - Jan 2011
    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Senior Network Engineer and Security Analyst
      • Nov 2007 - Apr 2010
    • United States
    • Education Administration Programs
    • 100 - 200 Employee
    • IT Operations Lead
      • Apr 2007 - Nov 2007
    • United States
    • Accounting
    • 1 - 100 Employee
    • Systems Administrator
      • Mar 2003 - Mar 2007
    • United States
    • Retail
    • 1 - 100 Employee
    • Help Desk Technician
      • Apr 1999 - Mar 2003

    • Mainframe Operator
      • Mar 1998 - Apr 1999

Education

  • Wilmington University
    BS, Information Security

Community

You need to have a working account to view this content. Click here to join now