Chris J’s Resume

Profile
Information assurance professional, public speaker, published author, and
information technology trainer. Over 15 years experience in physical and
technical security, network monitoring, network administration, and Unix
and Linux administration. Familiar with network and digital forensics,
incident response, and intelligence analysis.

Experience
Cyber Security Threat Intelligence Analyst
– [redacted] March 2017 to current

Threat Intelligence Analyst, Incident Detection and Response Analyst – [redacted] July 2015 to March 2017
• Design metrics for showing problems to executives to drive remediation
• Review external footprint to limit the attack surface
• Write Threat Intelligence Briefings on current attack patterns for executive management
• Do investigations and threat assessments on persons of interest
• Work with other departments to investigate possible 3rd party fraud
• Write shell and Python scripts to automate work for the Incident Detection and Threat Intelligence teams
• Review external threat intelligence feeds

Network Engineer – Epitec Inc. July 2012 to July 2015
• Perform network design for external facing applications and infrastructure
• Perform security reviews of external facing applications and infrastructure
• Firewall planning and support including troubleshooting customer issues
• Planning and Support for TN3270 WebConnect system
• Perform consultation on requirements and capability for external network
connections
• Cisco IronPort Proxies planning and support
• Project management related to network applications and infrastructure
• Write shell scripts utilizing grep to parse firewall and vpn concentrator logs
• Perform annual security audits
• PO and contract renewals

Data Network Engineer – Compuware. February 2011 – July 2012
• Configured and re-enabled VPN accounts for users
• Configured site to site IPSEC VPN tunnels over the Internet and ANX
• Troubleshot network problems using packet captures and systems logs
• Recovered critical data from failed server using Open Source tools
• Configured dynamic VLAN based on MAC address
• Added and removed servers and server farms from Cisco load balancers
• Added, deleted, modified and audited access lists on Cisco based firewalls
• Designed and wrote training material
• On-Call rotation with maintenance window work

Senior Network Engineer – NA Publishing. October 2006 to February 2011
• Designed, maintained, and audited Cisco data network
• Designed in-house Digital and Network Forensics policies and procedures
• Designed Network Monitoring and Security Monitoring system
• Analyzed logs and packet captures for performance and security violations
• Performed data recovery on deleted files and file systems
• Lead Data Center migration project
• Configured and maintained Linux and Windows systems
• Maintained SAN and NAS storage solution
• Wrote Perl and Shell scripts

Education
Bachelor of Science – Applied Information Assurace
Eastern Michigan University. Ypsilanti, MI United States
GPA: 3.8
Related Projects:
• Wireless Intrusion Detection System with Raspberry Pi
• Tracking Human Trafficking in the Digital Age (OSINT based)
• Campus Crime Mapping Project (OSINT)

Associate Applied Science – Computer Information Systems
Henry Ford Community College. Dearborn, MI United States
GPA: 3.59
Honor’s projects:
• Proof of concept of MySQL shipwreck database

Associate General Studies focus on Anthropology
Henry Ford Community College. Dearborn, MI United States
GPA: 3.65
Honor’s Project:
• Ethnographic study of Buddhism among college aged population

Certifications
• Incident Response to Weapons of Mass Destruction
• Incident Response to Terrorist Bombings program – Awareness Level
• Comptia Security+
• Offensive Security Wireless Professional (OSWP)

Publications
• Real-Time Rogue Wireless Access Point Detection with the Raspberry Pi. The Linux Journal – Issue 248, December 2014
• Book Review: Hacking for Dummies 3rd Edition. Ethical Hacker Network – April 2010

Public Speaking
• “Threat Intelligence: From Zero to Basics”, Circle City Con, Indianapolisis, IN, June 2017
• “TOOOL Lock Pick Village,” Circle City Con, Indianapolis, IN, June 2016
• “Workshop:Introduction to Software Defined Radio with the RTL-SDR on Windows and the Raspberry Pi 2,” Circle City Con, Indianapolis, IN, June 2016
• “Wireless Intrusion Detection System with the Raspberry Pi,” GrrCon, Grand Rapids, MI, October 2015
• “TOOOL Lock Pick Village,” Maker Faire Detroit. Dearborn, MI, July 2015
• “Wireless Intrusion Detection System with the Raspberry Pi”, Circle City Con, Indianapolis, IN, June 2015
• “Human Trafficking in the Digital Age”, DerbyCon, Louisville, KY, September 2014
• “TOOOL Lock Pick Village,” Maker Faire Detroit. Dearborn, MI, July 2014
• “Human Trafficking in the Digital Age”, Circle City Con, Indianapolis, IN, June 2014
• “Profiling Campus Crime”, Circle City Con, Indianapolis, IN, June 2014
• “Intro to Linux System Hardening”, DerbyCon, Louisville, KY, September 2012
• “Intro to Linux Hardening and Applying to Backtrack Linux”, GrrCon. Grand Rapids, MI, September 2012
• “Introduction to Hardening Linux Workshop”, MISEC, Royal Oak, MI, August 2012.
• “TOOOL Lock Pick Village,” Maker Faire Detroit. Dearborn, MI, July 2012
• “Intro to Linux Hardening and Applying to Backtrack Linux”, Security Bsides Detroit. Detroit, MI, June 2012
• “TOOOL Lock Pick Village,” Security Bsides Detroit. Detroit, MI, June 2012
• “TOOOL Lock Pick Village,” GrrCON. Grand Rapids, MI, September 2011
• “TOOOL Lock Pick Village,” Maker Faire Detroit. Dearborn, MI, July 2011
• “Lock Pick Village,” Security Bsides Detroit. Detroit, MI, June 2011

Leave a Reply

Your email address will not be published. Required fields are marked *