Personal Information
Organization / Workplace
Houston, Texas Area United States
Occupation
Cyber Threat Intel Analyst - Energy Sector
About
• Over 13 years’ experience in Information technology including four years of incident response, critical security event detection/monitoring, penetration testing, forensic investigations, vulnerability assessments, data leakage/exfiltration detection, and IT security solution evaluation and validation.
• CISSP, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), and Certified Network Defense Architect (CNDA) certified. Bachelor of Science – Information Technology, and Associates of Science – Network Security.
• Performed team lead roles and responsibilities to include mentoring new team members on organization processes and procedures managing group mailboxes, and e...
Likes
(13)Office 365 Incident Response 2019 B-Sides Orlando
Alex Parsons
•
5 years ago
The Diamond Model for Intrusion Analysis - Threat Intelligence
ThreatConnect
•
10 years ago
ATT&CKing with Threat Intelligence
Christopher Korban
•
5 years ago
Hunting for Credentials Dumping in Windows Environment
Teymur Kheirkhabarov
•
6 years ago
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
•
5 years ago
Fade from Whitehat... to Black
Beau Bullock
•
8 years ago
Purpose Driven Hunt (DerbyCon 2017)
Jared Atkinson
•
6 years ago
Automated, Collection, and Enrichment (ACE)
Jared Atkinson
•
6 years ago
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) - Defcon 25
Chris Thompson
•
6 years ago
Billions & Billions of Logs
Jack Crook
•
7 years ago
Logging for Hackers - What you need to know to catch them
Michael Gough
•
7 years ago
Ask a Malware Archaeologist
Michael Gough
•
9 years ago
Up is Down, Black is White: Using SCCM for Wrong and Right
enigma0x3
•
7 years ago
Personal Information
Organization / Workplace
Houston, Texas Area United States
Occupation
Cyber Threat Intel Analyst - Energy Sector
About
• Over 13 years’ experience in Information technology including four years of incident response, critical security event detection/monitoring, penetration testing, forensic investigations, vulnerability assessments, data leakage/exfiltration detection, and IT security solution evaluation and validation.
• CISSP, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), and Certified Network Defense Architect (CNDA) certified. Bachelor of Science – Information Technology, and Associates of Science – Network Security.
• Performed team lead roles and responsibilities to include mentoring new team members on organization processes and procedures managing group mailboxes, and e...