Hiep Hinh

MDR Principal Analyst at Malwarebytes
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Suwanee, Georgia, United States, GE

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Brian McKinney

Hiep is an outstanding forensic analyst and was always a "go-to" guy in our lab. His extensive intel background gave him the unique ability to hone in on key investigation artifacts that others missed entirely, making him one of our strongest assets.

Jason Garcia

Hiep is an exceptional computer forensic analyst and team player. His analysis skill and attention to detail give him a great advantage in the field of computer forensics. I strongly recommend Hiep to any computer forensics team or malware analysis team.

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • MDR Principal Analyst
      • Apr 2022 - Present

      Computering like crazy. Computering like crazy.

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Security Associate Manager
      • Feb 2019 - Apr 2022

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Team Lead, Senior Cyber Defense Analyst
      • Oct 2018 - Feb 2019

    • Sr. Hunter
      • Mar 2017 - Oct 2018

      • Senior cyber security hunter providing expert operational knowledge in support of product planning, demonstrations, installations, operations, and training. Played a key role in the growth of our company by helping to shape, enhance and share knowledge of cyber hunt methodologies using Endgame’s products and others. Great problem solving, operations, requirements analysis and technical implementation skills. Clear communicator, team-oriented, and a quick learner. • Thorough understanding of malware, with knowledge of adversary tactics, techniques and procedures • Able to recognize and analyze malware based on a combination of behavioral activity and signature-based tippers that lead to being able to visualize and act upon malicious activity on a system or network. • Understanding the standard configurations of modern security hardware/software tools/solutions, such as: firewalls, proxies, virus prevention and remediation, access control, encryption, and log analysis • Proficiency in conducting live network forensics and analysis • malware analysis experience (static and dynamic analysis) • Ability to support, perform, and troubleshoot hardware and software installations independently • Effective oral and written communication skills. The ability to train hunting and provide process improvement-related feedback to a broad audience Show less

  • Endgame Systems
    • San Antonio, Texas Area
    • Malware Reverse Engineer/Hunt Team Member
      • Oct 2011 - Mar 2016

      • Senior cyber security hunter providing expert operational knowledge in support of product planning, demonstrations, installations, operations, and training. Played a key role in the growth of our company by helping to shape, enhance and share knowledge of cyber hunt methodologies using Endgame’s products and others. Great problem solving, operations, requirements analysis and technical implementation skills. Clear communicator, team-oriented, and a quick learner. • Thorough understanding of malware, with knowledge of adversary tactics, techniques and procedures • Able to recognize and analyze malware based on a combination of behavioral activity and signature-based tippers that lead to being able to visualize and act upon malicious activity on a system or network. • Understanding the standard configurations of modern security hardware/software tools/solutions, such as: firewalls, proxies, virus prevention and remediation, access control, encryption, and log analysis • Proficiency in conducting live network forensics and analysis • malware analysis experience (static and dynamic analysis) • Ability to support, perform, and troubleshoot hardware and software installations independently • Effective oral and written communication skills. The ability to train hunting and provide process improvement-related feedback to a broad audience Show less

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Senior Hunter
      • Oct 2011 - Mar 2016

    • United States
    • Information Technology & Services
    • 700 & Above Employee
    • Computer Forensic Analysis/Incident Response
      • Nov 2009 - Oct 2011

    • United States
    • Defense and Space Manufacturing
    • 300 - 400 Employee
    • Computer Forensics Analyst
      • Jun 2007 - Oct 2009

Community

You need to have a working account to view this content. Click here to join now