Grayson Berman

Director - West at Goliath Cyber Security Group
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
San Francisco Bay Area

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Director - West
      • Apr 2023 - Present

    • United States
    • Research Services
    • 700 & Above Employee
    • Information System Security Officer
      • Nov 2021 - Apr 2023

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Cyber Intelligence Analyst
      • Jun 2019 - Jul 2021

      Threat Detection, Incident Investigation, and Incident Response: Provide defense industrial base customers with advanced detection and response security services, investigating, analyzing, triaging, and remediating issues to protect highly sensitive data and systems. Security Tools, Bash, Splunk, Wireshark, and VMWare: Leverage proprietary and open-source tools—such as YARA, Suricata, Bash, JQ/JSON, Splunk, Wireshark, and VMware—to detect malicious network and email activity (including advanced persistent threats). Security Information and Event Management (SIEM), Malware Detection, and Log Analysis: Monitor an SIEM system, analyzing hosts, networks, malware, and log data to detect malicious activity and investigate incidents. Cyber Defense and Intrusion Detection: As part of the Intelligence Driven Defense model, use the proprietary Cyber Kill Chain framework to anticipate, identify, and prevent cyber intrusions. Malware Analysis and Static Analysis: Conduct static and dynamic malware analysis, deobfuscating scripts and monitoring beaconing. Information Sharing and Cyber Threat Intelligence (CTI): Engage in information sharing with partners—such as the Federal Bureau of Investigation, the Department of Homeland Security, and other defense companies—to distribute and incorporate threat intelligence. Email Security and Network Defense: Using YARA and in-house tools, wrote and implemented durable email detections, preventing network penetration by thousands of malicious emails. These rules were shared with the National Defense Information Sharing and Analysis Center (NDISAC) and other Fortune 500 companies. Supply Chain Security, Issue Identification, and Information Security: Identified dozens of suppliers whose machines had been compromised by Emotet malware. Subsequently, worked closely with the supply chain cyber team to determine the scope and remediate/prevent issues. Show less

Education

  • Chapman University
    Bachelor's degree, Computer Science
    2017 - 2019

Community

You need to have a working account to view this content. Click here to join now