* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Shawn Bracken - CISSP103 Chester StMenlo Park, CA 94025
Information security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Cyberwarfare wikipedia , lookup
Cyberattack wikipedia , lookup
Airport security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Wireless security wikipedia , lookup
Security printing wikipedia , lookup
Unix security wikipedia , lookup
Mobile security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Distributed firewall wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
Shawn Bracken - CISSP 150 Miller Ave Mill Valley CA 94941 Primary Phone: 702.324.7065 Mobile: 702.324.7065 [email protected] WORK EXPERIENCE 2003 to Present, Principal Product Architect, HBGary, Inc., Sunnyvale, CA. Designed and implemented a cyber warfare platform called Predator Made major development contributions to a reverse engineering management system called Inspector. Oversee multiple projects and serve as a technical resource to other engineers. Perform software vulnerability testing. Write and test software exploit tools. Active participant in assisting with the development of new-research grant proposals Deliver training on techniques to exploit software. 2001 to 2003, Principal Research Engineer, Cenzic, Inc., Campbell, CA. Core team developer of Hailstorm, a network protocol modeling and fault injection system used for security testing. Head of the fault injection/content team responsible for product direction and technical leadership Designed and implemented functional security testing components. Some of these components include the current revision of the software fault injection Implemented Hailstorm's virtual TCP/IP stack implementation, complex state database implementations, interactive network monitors, and SSL over TCP. 2000 to 2001, Senior Research Scientist, Guardent, Waltham, MA. Founding member of Guardent's security research team doing cutting edge security research Conducted both pure security concept research and vulnerability research. Provided deep knowledge to the company’s consulting and managed security service teams. 1999 to 2000, Senior Security Research Engineer, Network Associates, Santa Clara, CA. Discovered and documented vulnerabilities in software packages/operating systems Created and examined new methods/concepts of information security Wrote advisories that were released and posted within the security community The advisories created visibility for NAI and maintained the effectiveness of NAI products Conducted peer reviews of advisories and white papers from other team members Served as a security resource within the organization 1998 to 1999, Network Security Consultant, International Network Services, Sacramento, CA Delivered consultative services to Fortune 500 companies Performed host and network based penetration testing Conducted security assessments, secure design and implementation of network security technologies such as IDS, firewalls, and VPNs 1998, Response Center Engineer, Hewlett Packard Company, Roseville, CA. Member of the backline-utilities team in HP's response center supporting HP-UX. Supported HP-UX Trusted Systems secure accounting/auditing and kernel configuration Our team was the 3rd layer support known as "backline" which handled the more difficult and time-consuming calls. Most customers were large production systems requiring high uptime. 1997 to 1998, Network Security Administrator, StateNET, Sacramento, CA. Audited and secured a small class-C network with 5 servers and about 400 remote/local users Redesigned and re-implemented firewall-1 rule sets Hardened Solaris machines 1996 to 1997, Senior UNIX System Administrator, Communications World Network (CWNET), Sacramento, CA. Managed a 3,000+ user Internet service provider Responsible for all operations such as installation and maintenance of machines, security and account management AFFILIATIONS 2000 to Present, Member of CISSP. SKILLS Advanced security theory General Security Tools Security/Cyber warfare tool design Software/OS vulnerability testing Secure code design/auditing Firewalls Intrusion Detection Systems IDS/Sniffer design and development Network programming Security Policy Review/Design TCP/IP Penetration Testing Covert channel communications Debugging/Quality Assurance Threaded Design (Pthreads) Risk Assessment UNIX Administration Network Administration Visual C++/MFC/Win32 C, C++, C# programming Windows System Development UNIX System Development