Will Currer
Security Consultant at NCC Group North America- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
English -
Topline Score
Bio
Credentials
-
GIAC Certified Project Manager (GCPM)
GIAC CertificationsSep, 2022- Nov, 2024 -
GIAC Defensible Security Architecture (GDSA)
GIAC CertificationsMay, 2022- Nov, 2024 -
GIAC Python Coder (GPYC)
GIAC CertificationsFeb, 2022- Nov, 2024 -
GIAC Critical Controls Certification (GCCC)
GIAC CertificationsNov, 2021- Nov, 2024 -
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
GIAC CertificationsAug, 2021- Nov, 2024 -
GIAC Penetration Tester (GPEN)
GIAC CertificationsApr, 2021- Nov, 2024 -
GIAC Advisory Board
GIAC CertificationsJan, 2020- Nov, 2024 -
GIAC Certified Intrusion Analyst (GCIA)
GIAC CertificationsOct, 2020- Nov, 2024 -
GIAC Certified Incident Handler (GCIH)
GIAC CertificationsJul, 2020- Nov, 2024 -
SANS Security Awareness Professional
SANS InstituteApr, 2020- Nov, 2024 -
GIAC Security Essentials Certification (GSEC)
GIAC CertificationsJan, 2020- Nov, 2024 -
CySA+
CompTIAFeb, 2019- Nov, 2024 -
CSAP
CompTIAFeb, 2019- Nov, 2024 -
Security+
CompTIAJun, 2018- Nov, 2024
Experience
-
NCC Group North America
-
United States
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Security Consultant
-
Nov 2021 - Present
- Works on their own and within a team of experts to penetrate into computer networks, applications or systems in order to figure out how a real criminal would do it. - Apply state-of-the-art methodologies, tooling, and skills to demonstrate real vulnerabilities, and help clients improve their security posture and technical controls to mitigate the issues. - Conducts ongoing research into the latest attack TTPs, collaborates with NCC’s technical consultants, and discovers dangerous flaws and major security vulnerabilities for our clients before they’re found by hackers of more malicious intent. - Utilizes skills such as solving puzzles, breaking things ( the intended usage of the application, protocol, etc.) and providing mitigations, tackling complex problems, and communicating with people. Show less
-
-
-
COLSA
-
United States
-
Defense and Space Manufacturing
-
700 & Above Employee
-
Cyber Security Analyst III
-
Dec 2018 - Oct 2021
• Team lead for a team of five network traffic analysts • Conducted network traffic analysis to include but not limited to Netflow and malware analysis. o Utilized the following tools: Zeek, snort, tcpdump, proprietary IDS, and alert aggregation tools • Generated vulnerability scan reports and reported findings to subscribing entities. • Provided subscribing entities with monthly security posture reports to include the criticality of vulnerabilities present on their network, percentage of systems that were receiving credentialed scans, the number of hosts which were compliant with government requirements, number of alerts fired, number of incident reports, etc. • Write incident reports on multiple categories once enough evidence is gathered and notify the appropriate personnel. • Viewed and analyzed HBSS queries to determine if unauthorized software was present or if a system was potentially compromised. • Conducts risk assessments and provides recommendations for application design. • Assists and may perform a wide range of Cybersecurity issues including architectures, firewalls, electronic data traffic, and network access, and reviews and recommends changes. • Familiar with encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research • Familiar with network cyber defense capabilities and basic understanding of network threats, potential network exploitation, and methods to defend against potential malicious activity. • Basic knowledge of Computer Network Defense technologies to include: Intrusion Detection Systems (IDS), Intrusion Protection Systems (IPS), network monitoring, packet capture analysis, network flow analysis, network proxy operation, firewalls, and anti-virus. Show less
-
-
-
Precise Systems, Inc.
-
United States
-
Defense and Space Manufacturing
-
300 - 400 Employee
-
Computer Systems Analyst
-
Apr 2018 - Nov 2018
ISSO- Ensure security measures are in-place and compliant with applicable security policies for assigned programs and products. Perform quarterly vulnerability assessments of supported projects. Patch and update equipment. Create/complete RMF packages. ISSO- Ensure security measures are in-place and compliant with applicable security policies for assigned programs and products. Perform quarterly vulnerability assessments of supported projects. Patch and update equipment. Create/complete RMF packages.
-
-
-
The Johns Hopkins University Applied Physics Laboratory
-
United States
-
Defense and Space Manufacturing
-
700 & Above Employee
-
Security Officer
-
Aug 2016 - Apr 2018
Patrol and provide inspections of 453 acres with more than 20 major buildings with nearby satellite campuses and parking lots monitoring for tampering, illegal entry, and enforce parking regulations. Verify the identification of 6,000 employees and visitors by badge inspection and/or using the security personnel databases. Provide inspections for unauthorized material. Ensure the safety of employees and visitors. Escort personnel to classified areas. Provide control of all incoming and outgoing property including classified material. Compose reports and forms manually and electronically. Lift heavy objects, employ defense tactics and use of fire extinguishers. Knowledgeable of company policy and procedures. Show less
-
-
-
US Army
-
United States
-
Armed Forces
-
700 & Above Employee
-
Infantry Soldier
-
Dec 2014 - Jul 2016
Appointed as Non-Commissioned Officer (NCO) of the Armsroom as a Junior Enlisted E-4 (normally an E-5 or E-6). Supervised and trained an alternate Armorer and Platoon Armorers on Armsroom operations and procedures. Trained soldiers on weapons maintenance, malfunction issues, proper safety and equipment draw/turn in procedures. •Skills as a weapons maintainer for 122 firearms for the organization •Maintained night/thermal vision devices •Secured over $1 million of Government Equipment with a 0% loss rate Issued weapons and equipment to soldiers in a safe and secure manner. Managed and verified paperwork was filled out and filed properly for all equipment. Inventory tracking of all equipment and repairs. Scheduled regular equipment pre-combat maintenance checks (PMCs) and inspection of equipment on a quarterly and annual basis. Prepared the Armsroom for routine inspections by the Battalion Commander and Sergeant Major as well as Brigade level which passed with no issues. Assisted Officers in monthly sensitive item (SI) inspections to ensure accountability and compliance. Prepared equipment for shipping and transport for Joint-Readiness Training Course (JRTC) and deployments. Supervised company level layout for the Company Commander for liability and accountability. As a Rifleman, operated mounted and dismounted to close with and destroy the enemy, employs, operates, and maintains assigned weapons and equipment. Employed proper dismounted movement techniques, cover, concealment, and camouflage as part of dismount team. Performed basic communication functions and operated platoon communications equipment. Constructed individual fighting positions. Collected and reported tactical information as a member of combat or reconnaissance patrol. Assisted in target detection, identification, and round sensing. Assisted in the breaching of minefields. Conducted security patrols and secures locations. Knowledgeable of the U.S. Army policy and procedures. Show less
-
-
-
Patriot Scuba
-
Occoquan, VA
-
Network Administrator
-
Jan 2009 - Dec 2014
Jump started new corporation by designing and managing the company's initial website o Used HTML, CSS, and PHP • Created online store for business • Encrypted database for protection against integrity and confidentiality • Defined network security vulnerabilities, developed plans and procedures, and ensured safety and privacy of newly developed internet and intranet sites • Configured, implemented, and maintained firewall technologies to keep website secure • Performed data backups and disaster recovery operations • Managed Wi-Fi access via the router • Deployed and configured VPN connections when remote connecting to the network • Maintained business network o Implemented Microsoft Active Directory to manage business network o Four workstations, server, and two networked printers located in two locations o Troubleshooting network issues • Patch and update software as required • Installed new operating systems on workstations • Configured, tested, and installed hardware and software on systems • Diagnosed hardware and software problems and applied appropriate fixes • Migrated the database and the company website to sue remote servers and cloud-based tools • Monitored and maintained the database records for point-of-sale system • Setup and managed Wi-Fi Show less
-
-
Education
-
SANS Technology Institute
Master of Science - MS, Information Security Engineering -
University of Maryland University College
Bachelor's Degree, Cyber Security -
Northern Virginia Community College
Associate's Degree, Information Technology -
James W. Robinson Secondary High School
High School, High School/Secondary Diplomas and Certificates