Download Shawn Bracken - CISSP103 Chester StMenlo Park, CA 94025

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Information security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Cyberwarfare wikipedia , lookup

Cyberattack wikipedia , lookup

Airport security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Wireless security wikipedia , lookup

Security printing wikipedia , lookup

Unix security wikipedia , lookup

Mobile security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Distributed firewall wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
Shawn Bracken - CISSP
150 Miller Ave
Mill Valley CA 94941
Primary Phone: 702.324.7065
Mobile: 702.324.7065
[email protected]
WORK EXPERIENCE
2003 to Present, Principal Product Architect, HBGary, Inc., Sunnyvale, CA.
 Designed and implemented a cyber warfare platform called Predator
 Made major development contributions to a reverse engineering management system
called Inspector.
 Oversee multiple projects and serve as a technical resource to other engineers.
 Perform software vulnerability testing.
 Write and test software exploit tools.
 Active participant in assisting with the development of new-research grant proposals
 Deliver training on techniques to exploit software.
2001 to 2003, Principal Research Engineer, Cenzic, Inc., Campbell, CA.
 Core team developer of Hailstorm, a network protocol modeling and fault injection
system used for security testing.
 Head of the fault injection/content team responsible for product direction and technical
leadership
 Designed and implemented functional security testing components.
 Some of these components include the current revision of the software fault injection
 Implemented Hailstorm's virtual TCP/IP stack implementation, complex state database
implementations, interactive network monitors, and SSL over TCP.
2000 to 2001, Senior Research Scientist, Guardent, Waltham, MA.
 Founding member of Guardent's security research team doing cutting edge security
research
 Conducted both pure security concept research and vulnerability research.
 Provided deep knowledge to the company’s consulting and managed security service
teams.
1999 to 2000, Senior Security Research Engineer, Network Associates, Santa Clara, CA.
 Discovered and documented vulnerabilities in software packages/operating systems
 Created and examined new methods/concepts of information security
 Wrote advisories that were released and posted within the security community
 The advisories created visibility for NAI and maintained the effectiveness of NAI
products
 Conducted peer reviews of advisories and white papers from other team members
 Served as a security resource within the organization
1998 to 1999, Network Security Consultant, International Network Services, Sacramento,
CA
 Delivered consultative services to Fortune 500 companies


Performed host and network based penetration testing
Conducted security assessments, secure design and implementation of network security
technologies such as IDS, firewalls, and VPNs
1998, Response Center Engineer, Hewlett Packard Company, Roseville, CA.
 Member of the backline-utilities team in HP's response center supporting HP-UX.
 Supported HP-UX Trusted Systems secure accounting/auditing and kernel configuration
 Our team was the 3rd layer support known as "backline" which handled the more difficult
and time-consuming calls.
 Most customers were large production systems requiring high uptime.
1997 to 1998, Network Security Administrator, StateNET, Sacramento, CA.
 Audited and secured a small class-C network with 5 servers and about 400 remote/local
users
 Redesigned and re-implemented firewall-1 rule sets
 Hardened Solaris machines
1996 to 1997, Senior UNIX System Administrator, Communications World Network
(CWNET), Sacramento, CA.
 Managed a 3,000+ user Internet service provider
 Responsible for all operations such as installation and maintenance of machines, security
and account management
AFFILIATIONS
2000 to Present, Member of CISSP.
SKILLS











Advanced security theory
General Security Tools
Security/Cyber warfare tool design
Software/OS vulnerability testing
Secure code design/auditing
Firewalls
Intrusion Detection Systems
IDS/Sniffer design and development
Network programming
Security Policy Review/Design
TCP/IP











Penetration Testing
Covert channel communications
Debugging/Quality Assurance
Threaded Design (Pthreads)
Risk Assessment
UNIX Administration
Network Administration
Visual C++/MFC/Win32
C, C++, C# programming
Windows System Development
UNIX System Development