Grayson Berman
Director - West at Goliath Cyber Security Group- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
Goliath Cyber Security Group
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Director - West
-
Apr 2023 - Present
-
-
-
Lawrence Livermore National Laboratory
-
United States
-
Research Services
-
700 & Above Employee
-
Information System Security Officer
-
Nov 2021 - Apr 2023
-
-
-
Lockheed Martin
-
United States
-
Defense and Space Manufacturing
-
700 & Above Employee
-
Cyber Intelligence Analyst
-
Jun 2019 - Jul 2021
Threat Detection, Incident Investigation, and Incident Response: Provide defense industrial base customers with advanced detection and response security services, investigating, analyzing, triaging, and remediating issues to protect highly sensitive data and systems. Security Tools, Bash, Splunk, Wireshark, and VMWare: Leverage proprietary and open-source tools—such as YARA, Suricata, Bash, JQ/JSON, Splunk, Wireshark, and VMware—to detect malicious network and email activity (including advanced persistent threats). Security Information and Event Management (SIEM), Malware Detection, and Log Analysis: Monitor an SIEM system, analyzing hosts, networks, malware, and log data to detect malicious activity and investigate incidents. Cyber Defense and Intrusion Detection: As part of the Intelligence Driven Defense model, use the proprietary Cyber Kill Chain framework to anticipate, identify, and prevent cyber intrusions. Malware Analysis and Static Analysis: Conduct static and dynamic malware analysis, deobfuscating scripts and monitoring beaconing. Information Sharing and Cyber Threat Intelligence (CTI): Engage in information sharing with partners—such as the Federal Bureau of Investigation, the Department of Homeland Security, and other defense companies—to distribute and incorporate threat intelligence. Email Security and Network Defense: Using YARA and in-house tools, wrote and implemented durable email detections, preventing network penetration by thousands of malicious emails. These rules were shared with the National Defense Information Sharing and Analysis Center (NDISAC) and other Fortune 500 companies. Supply Chain Security, Issue Identification, and Information Security: Identified dozens of suppliers whose machines had been compromised by Emotet malware. Subsequently, worked closely with the supply chain cyber team to determine the scope and remediate/prevent issues. Show less
-
-
Education
-
Chapman University
Bachelor's degree, Computer Science