Personal Information
Organization / Workplace
San Francisco Bay Area United States
Occupation
Cloud Security Architect
Industry
Technology / Software / Internet
Website
http://www.oracle.com
About
Experienced security lead with over 12 years of experience in difference security disciplines including application security, security development lifecycle, security operations and security compliance.
Application Security: OWASP Top 10, Fortify, Coverity, AppScan, SDLC, Burp Suite, Threat Modeling
Full Stack Cloud Security Monitoring
Host Security Monitoring: CloudPassage/OSSEC, Linux kernel hardening (GrSecurity/SELinux)
SIEM/Log based Intrusion Detection: Splunk/SumoLogic/ELK
Cloud: AWS, CloudStack, Xen
Mobile Security: EMM, Android, iOS security
Security Compliance: PCI, SOC 2 Type 2, FedRAMP
Certifications: CISSP, CSSLP and SANS GSSP-C
Likes
(54)Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016
Amazon Web Services
•
7 years ago
AWS Governance Overview - Beach
Amazon Web Services
•
11 years ago
How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as Code (SEC321-R1) - AWS re:Invent 2018
Amazon Web Services
•
5 years ago
Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R1) - AWS re:Invent 2018
Amazon Web Services
•
5 years ago
Five New Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules - SID405 - re:Invent 2017
Amazon Web Services
•
6 years ago
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
Amazon Web Services
•
5 years ago
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Amazon Web Services
•
6 years ago
AWS re:Invent 2016: Predictive Security: Using Big Data to Fortify Your Defenses (SAC304)
Amazon Web Services
•
7 years ago
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for High Security (SEC303)
Amazon Web Services
•
7 years ago
(SEC401) Encryption Key Storage with AWS KMS at Okta
Amazon Web Services
•
8 years ago
(SEC324) NEW! Introducing Amazon Inspector
Amazon Web Services
•
8 years ago
(SEC314) AWS for the Enterprise: Implementing Policy, Governance & Security
Amazon Web Services
•
8 years ago
Cloud Security At Netflix, October 2013
Jay Zarfoss
•
10 years ago
AWS Security Best Practices and Design Patterns
Amazon Web Services
•
9 years ago
Guide to understanding_fed_ramp_042213
Tuan Phan
•
10 years ago
Building low latency java applications with ehcache
Chris Westin
•
10 years ago
From distributed caches to in-memory data grids
Max Alexejev
•
11 years ago
Performing Network & Security Analytics with Hadoop
DataWorks Summit
•
11 years ago
How LinkedIn changed its security model in order to offer an API
LinkedIn
•
15 years ago
SplunkLive! Washington DC May 2013 - Splunk Security Workshop
Splunk
•
10 years ago
Journey Through the AWS Cloud; Development and Test
Amazon Web Services
•
11 years ago
Security Best Practices on AWS
Amazon Web Services
•
11 years ago
Data Driven Security, from Gartner Security Summit 2012
Nick Galbreath
•
11 years ago
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Nick Galbreath
•
11 years ago
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
Nick Galbreath
•
12 years ago
Metrics-Driven Engineering
Mike Brittain
•
12 years ago
ruxc0n 2012
mimeframe
•
11 years ago
Netflix Cloud Platform Building Blocks
Sudhir Tonse
•
11 years ago
Cloud Security at Netflix
Jason Chan
•
12 years ago
OpenStack in Action
Mirantis
•
11 years ago
Personal Information
Organization / Workplace
San Francisco Bay Area United States
Occupation
Cloud Security Architect
Industry
Technology / Software / Internet
Website
http://www.oracle.com
About
Experienced security lead with over 12 years of experience in difference security disciplines including application security, security development lifecycle, security operations and security compliance.
Application Security: OWASP Top 10, Fortify, Coverity, AppScan, SDLC, Burp Suite, Threat Modeling
Full Stack Cloud Security Monitoring
Host Security Monitoring: CloudPassage/OSSEC, Linux kernel hardening (GrSecurity/SELinux)
SIEM/Log based Intrusion Detection: Splunk/SumoLogic/ELK
Cloud: AWS, CloudStack, Xen
Mobile Security: EMM, Android, iOS security
Security Compliance: PCI, SOC 2 Type 2, FedRAMP
Certifications: CISSP, CSSLP and SANS GSSP-C