skills and experience...

Here's what I've been doing for the last twenty-five or so years...

2018-2021 Subject Matter Expert:

- Integration and Automation (multi-language: Python, PowerShell, etc.)

- SIEM Prevention and Detection Engineering and Analysis

- Reverse Engineering Malware

- Blackberry Cylance (Protect, Optics)

- Splunk (Splunk Enterprise, Splunk Cloud)

Operating Systems:

- Mac OS X 10.5 – 10.10.5, 10.11 - 10.12.3, 11.1

- Windows: 3.1, 95, 98, CE, 2000, XP, Vista, 7, 10, 10H2, Server NT4/2000/2003/2008R2/2012R2/2016/2019

- Linux Distributions: Slackware, Redhat, CentOS, Ubuntu, Raspbian, various LiveCDs

- Security Distributions: BackTrack, Kali, ParrotOS, REMnux, FLARE VM, Commando VM, SecurityOnion, various LiveCDs

- Others include MS-DOS 6.22, DRDOS, BIGDOS, ChromeOS, HP-UX, AIX, VAX, *BSD, Unix System V

- Cisco IOS, Juniper JunOS, 3Com OS

- Apple IOS, Android, Raspbian

Virtualization:

- Hyper-V HyperVisor, VMWare ESX/i, VMWare Workstation Pro, VMWare Fusion Pro, VirtualBox, Virtual PC

Management Software

- Unicenter, BMC, STIX, Sharepoint, LiveTime, BMC Track-It, DeMisto/Cortex XSOAR, Service Now

Programming Environments:

- MS Visual Studio 6, InstallShield 6-11, VS.NET, XCode, Postman, PyCharm, PHPStorm, VSCode, Eclipse, UEStudio

Programming, Scripting and Markup Languages:

- C, C++, C#, Turbo Pascal, BASIC, GW-BASIC, Quick Basic, Visual Basic, GoLang,

x86 Assembler (MASM), ObjectiveC, Java, WSH, VBScript, perl, DOS Batch/Command,

JavaScript, Python, Ruby, InstallScript, ActionScript, AppleScript, bash, Shell Script,

HTML, XML, CSS, ASP, PHP, PowerShell, NodeJS

Hacking (scanning, sniffing, attacking, exploiting, defending)

- Wired and Wireless (802.11 a/b/g/n/ac), Internet, LAN, WAN, VPN,

reverse engineering, malware analysis/generation,

cryptography(encryption/decryption/obfuscation), binary vulnerability/exploitation,

web application vulnerability/exploitation, forensics, fuzzing,

open source security tools, penetration testing, security assesment,

network security monitoring, custom hacking and security tools,

surveillance, reconnaissance, countermeasures, social engineering

IoT, clouded services

Educational Environments:

- Windows Active Directory and GPO, VNC remote software, RDC, Examsoft, Datatel,

Polycom videoconferencing, clouded web services.

Networking Environments:

- Managed 3Com switches, Cisco Switches/Routers/Appliances/IDS/IPS, Juniper Switches, Frame Routers, Avocent RKVM, Cisco Meraki Wireless

- Palo Alto

Security SIEMs:

- Splunk (Enterprise, Cloud)

- Alien Vault

- ELK Stack: Elasticsearch, Logstash, Kibana

Security Software:

- Okta Authentication

- Accellion Kiteworks

- Armis

- Blackberry Cylance

- Flashpoint Intel

- HISAC

- Palo Alto Networks

- Proofpoint

- Tenable Nessus

Speciality Environments:

Research and development of PKI security products including smart card and biometric

Speciality skill-set:

API/Scraping, Programmatic Automation, Testing and Tool Building

Speciality Hardware:

Raspberry Pi, 3Com IntelliJack Switch NJ220, Hak5 devices

Hobbies, pastimes and freetime activities:

Information Security, Cryptography, Malware R&D, Digital Forensics, Programming,

Software Development, Hacking, Physical Security,

Electronics: Electronic Technology (analog and digital circuits),

Lockpicking, OSX, iOS, Android, Ham Radio Operator (Technician Class),

IDPA Competitive Shooting, NRA Member, Freelance Writer For Milton Security Group,

Hakin9 It Security Magazine, Securemac, Pentest Magazine, Infosec Institute,

Eforensics Magazine, Blacklisted!411 Magazine,

Videogaming (Console: Xbox One, Games: RPG,FPS, OSX:SecondLife), Motorcycling,

Moto-Gymkhana, Brass Musician, English, Arabic (MSA), Spanish, Cigar Connoisseur,

Dungeons and Dragons (5e), Pathfinder

Puzzles - Jigsaw and Hanayama

Valid California Driver License REAL ID, Class C, Class M1

Roles held:

CSR, Senior Technician

QA Tester, Software Engineer

Computing Specialist, Senior Computing Specialist

Networking Specialist

Server Administrator, Systems Administrator

Security Analyst, Security Manager, Information Security, Cyber Security

Cyber Security Engineer, Cyber Security Integration and Automation Engineer

Principal Malware Research Engineer

Additional freelance roles:

Technical Writer

Security Consultant

Penetration Tester

Malware Researcher

Reverse Engineer

Resume

Download 2022 Resume