Cyber and Information Security Section
Senior Cyber Security Auditor | Risk and Threat Intelligence Analyst | Penetration Tester | Consultant | Automator
CISSP, GPEN, GCTI, GCSA, GSLC, ITIL 4, FSCE
Results-driven, analytical, and thorough security professional. Experiences include a wide range of information security work at the largest private non-profit cancer center in the world, Memorial Sloan Kettering Cancer Center, as well as many enterprise corporations, such as a major independent investment bank. Expertise includes qualitative and quantitative risk assessment, penetration testing, threat intelligence, and security consulting. Excels at communicating complex information into easily intelligible concepts for executive and nontechnical stakeholders. Champions stakeholder engagement in the security process. Adept at automating and optimizing information security initiatives. Self-starter with leadership qualities who thrives in fast-pace environments.
Skills and Core Competencies:
Risk Assessment:
Able to accurately assess risk and security posture through qualitative or quantitative methods of enterprise solutions (on-site and cloud), vendor relationships, data sharing relationships, research studies, RFPs, and infrastructure.
Penetration Testing (GPEN):
Able to perform tests on complex technologies and environments, including enterprise cloud solutions, traditional on-site infrastructures, web applications (OWASP), mobile technologies, mobile applications, enterprise software, specialized hardware, custom in-house software, APIs, and system integrations.
Cyber and Information Security Policy:
Able to review, develop, audit, and contribute to the implementation of policies, standards, procedures, guidelines, and SOPs
Cyber Threat Intelligence (GCTI):
Able to utilize SIEM solutions, analyze event data and correlations, monitor threat feeds, identify IOCs, incorporate the MITRE ATT&CK framework, and identify area’s of improvement (“lessons learned”).
Governance, Risk, and Compliance (GRC), and Auditing:
Able to enhance and enforce security policy, identify gaps both technical and procedural, verify security controls, as well as both utilize and optimize complex GRC tools to both ensure and report on governance, risk, and compliance objectives. Familiar with many regulatory requirements, industry standards, and frameworks, such as HIPAA, ISO 27000 series, NIST CSF, COBIT, and more.
Industry Best Practice Consulting:
Able to consult, advise, provide expert advise, and assist on security projects or initiatives to ensure alignment with current industry best practices
Governance, Risk, and Compliance (GRC), and Auditing:
Able to enhance and enforce security policy, identify gaps both technical and procedural, verify security controls, as well as both utilize and optimize complex GRC tools to both ensure and report on governance, risk, and compliance objectives. Familiar with many regulatory requirements, industry standards, and frameworks, such as HIPAA, ISO 27000 series, NIST CSF, COBIT, and more.
Security Awareness:
Able to raise awareness, educate, and successfully engage users and stakeholders in security practices and the security process.
Programming:
Able to create, understand, and in some cases reverse engineer software and scripts.
Mobile Threat Protection (MTP):
Able to audit, protect, and remediate mobile devices, including but not limited to Apple iOS and Android platforms. Able to integrate with an MDM solution.
Mobile Device Management (MDM):
Able to deploy and manage MDM solutions, craft policy, and enforce corporate mobile integrity. Able to integrate with an MTP solution.
Advanced Threat Protection (ATP – IDS/IPS):
Able to defend network and endpoints utilizing new next-generation and advanced technologies, such as anti-malware technology that detects behavioral anomalies as opposed to standard signature matching.
Database Activity Monitoring (DAM):
Able to audit and protect database applications.
Web Application Firewalls (WAF):
Able to manage, audit, and protect web applications.
Network Access Control (NAC):
Able to ensure network access control creating visibility, compliance, and remediation of unauthorized network devices.
Data Loss Prevention (DLP):
Able to manage DLP solutions.
Certifications:
(Click a certification below to see the certificate)
- Certified Information Systems Security Professional (CISSP)
- GIAC Penetration Tester (GPEN)
- GIAC Cyber Threat Intelligence (GCTI)
- GIAC Cloud Security Automation (GCSA) [in progress]
- ITIL 4 Foundation in IT Service Management
- ForeScout Certified Engineer (FSCE)
- ForeScout Certified Administrator (FSCA)
- Project Management Professional (PMP) [in progress]
- Qualys Certified Specialist
- Zscaler ZCCA
- Cylance Certified Administrator
- FireEye Illuminator
- Pursuing OSCP
Education:
(Click a Degree below below to see the formal Degree)
Highlight of Enterprise and Open-Source Tools Knowledge:
Qualys, Nexpose, Nessus and other Tenable Solutions (such as Security Center), ForeScout CounterACT, Splunk, RSA Archer, Burp, Zed attack proxy, nmap, sqlmap, Metaspoit, Netcat, John the Ripper, empire, Hydra, Arachni, Demisto, SSLlabs, Imperva SecureSphere Web Application Firewall, Imperva SecureSphere Database Activity Monitoring, Imperva Incapsula, Zscaler, LookOut, CheckPoint MTP, Zimerium zIPS, Zimerium zANTI, MobileIron, AirWatch, ForcePoint (formerly WebSense) Triton, Intel/McAfee SIEM, Cylance, Cyphort, FireEye, CrowdStrike, Thycotic, Xcode, Wordpress, Visual Studio, Coda, Eclipse, Teamviewer, Final Cut Pro X (and 7), Adobe Premiere Pro, After Effects, Illustrator, Grass Valley Edius, BoinxTV, Kali, fing, ettercap, zANTI, spoofing tools, networking protocols, familiar with many jailbreak and rooting exploits, familiar with well-known malicious mobile application exploits and vulnerabilities, such as Stagefright, Pegasus, and many more.