Post Job Free
Sign in

Project Manager Security

Location:
Winnipeg, MB, Canada
Posted:
December 06, 2012

Contact this candidate

Resume:

Ronald Bowes

*** *** ********* ******

Winnipeg, Manitoba

R3M 3H5

Phone: 204-***-****

Email: ***@*************.***

Bachelor of Computer Science (Honours), graduation date of April 2006

Reverse engineered and implemented security checks and libraries for dozens of

undocumented software platforms at Tenable Network Security, considerably

expanding their security scanner's capabilities

Helped improve the Government of Manitoba's security posture by installing

and maintaining leading edge security tools and training developers

Generated record amounts of press coverage by expanding Symantec's Internet

Security Threat Report

Achieved two GIAC certifications: GPEN (96% on the certification exam) and

GCIH (98% on the certification exam)

Developed open source scripts for the Nmap Scripting Engine with a wide range

of purposes, including vulnerability and backdoor detection

Certifications

(ISC)2 Certified Information Systems Security Professional (CISSP)

GIAC Certified Incident Handler (GCIH) (Silver)

GIAC Penetration Tester (GPEN) (Gold)

Arcsight Certified Security Analyst (ACSA)

Arcsight Certified Integrator/Administator (ACIA)

Bachelor of Computer Science (Honours) (University of Manitoba)

Specialized in networks and security

Work Experience

November, 2010 Present Winnipeg, MB

Vulnerability Research Engineer

Tenable Network Security

Reverse engineered and implemented undocumented network protocols

used by Enterprise software (such as Microsoft, HP, Citrix, Red Hat, and

others)

Implemented complicated network protocols based on specifications, often

on short timelines

Wrote audits to validate that the most recent version of software was

installed on customers' networks (with minimal false positives/negatives)

Performed detailed analysis of software patches for a variety of software

platforms, especially Microsoft's Patch Tuesday patches

Implemented several protocol libraries that are actively used by other

developers

January, 2010 March, 2010 Winnipeg, MB

Mentor (Instructor)

The SANS Institute

Taught SANS Security 560 (Penetration Testing and Ethical Hacking) to a

group of local students

Covered the same material as a full SANS course, but in half the time due

to the Mentor format

Helped students work through labs, demonstrations, and the final hands

on workshop

Averaged a 100% ranking from the students, was asked to run another

class in the future

November, 2007 October, 2010 Winnipeg, MB

Senior Security Analyst

Information Protection Centre

Government of Manitoba

Performed security analysis and penetration testing of Web applications,

mostly ASP.net, Java, and PHP

Trained and directed developers on best security practices for coding

Installed, configured, monitored, and maintained a security event

management system (ArcSight)

Developed tools and scripts to identify unpatched or vulnerable hosts on

our network

Mentored six students per year from the University of Manitoba Computer

Science Co op program. Participated in all aspects of the Co op program,

including interviewing, selection, mentorship, supervising, and reviewing

January, 2007 October, 2007 Calgary, AB

Security Analyst / Editor

Symantec Corp

Helped expand Symantec's Internet Security Threat Report to cover new

regions and organizations

Built tools to monitor black market transactions, such as credit card sales

Edited corporate blog posts for grammar and content

May, 2006 December, 2006 Winnipeg, MB

Programmer / Project Manager

Great White North Software Solutions

Developed and maintained applications written in PHP and MySQL

Wrote an extensive PHP application that interfaces with AutoCAD,

automatically generating material lists, costs, and reports for a building

company

Helped maintain and customize Global Office, which is an office manager

suite.

Volunteer and Opensource Work

Hackerspace

Founder and president of Winnipeg's first and only hackerspace

SkullSpace Winnipeg Inc.

Handling all aspects of running a non profit, including legal matters,

running meetings, facilitating projects, public relations, handling

relationships with related groups, securing funding, and more

In its first year, SkullSpace Winnipeg has become Canada's largest

hackerspace by membership size

Ran a workshop on reverse engineering skills for over 20 members

Nmap Security Scanner

Wrote a collection of over 24 Nmap Scanning Engine (NSE) scripts,

including several libraries

Wrote a script to detect Conficker infections with a short and strict

deadline, helping Nmap achieve a record number of downloads

Implemented Microsoft's Server Message Block (SMB) and Remote

Procedure Call (MSRPC) protocols in Lua through a combination of packet

logging, reading books and whitepapers, and trial and error

Helped security group from an American university scan networks for weak

passwords and vulnerable systems; found hundreds of such systems,

including a domain controller with blank administrative passwords

Published several blogs on the subject, which frequently explain the

intricacies protocol to a technical (but not specialized) audience

http://www.skullsecurity.org/blog/?cat=9

Authored a paper titled Scanning Windows Deeper With the Nmap Scanning

Engine:

http://www.giac.org/certified_professionals/practicals/GPEN/00049.php

Battle.net Protocol Analysis

Reverse engineered and implemented an open source version of Blizzard's

Battle.net protocol, including version validation, encryption, and

authentication. This included Blizzard's implementation of the Secure

Remote Password (SRP) protocol and their enhanced lockdown protection:

http://www.skullsecurity.org/wiki/index.php/SRP

http://www.skullsecurity.org/wiki/index.php/Lockdown

Generated reusable code whenever possible; has since been used in several

successful projects, including Just Another Battle.net Login Service (JBLS),

which handled over 1000 login requests per day

Assembly language tutorial

Wrote a tutorial on x86 assembly language and reverse engineering, due to

interest generated by my Battle.net work:

http://www.skullsecurity.org/wiki/index.php/Assembly

Targeted developers with a technical background, but not necessarily with a

background in low level languages

Technical Skills

Networking

Firm understanding of scanning and penetration testing tools, including

Nmap, Metasploit, Wireshark/Ethereal, Nessus, Foundstone, IBM AppScan,

Paros, Burp Suite, Netcat, Hydra, John, Rainbow Crack, and many more

Firm understanding of network security concepts, including threat and risk

analysis, security event/incident monitoring, asset and risk management,

and intrusion detection and prevention sensors

Experienced with configuring both Windows and Linux networks

Basic knowledge of SAP deployment and security

Operating Systems

Proficient with Linux based systems

Experienced with many versions of Windows (including Windows 7), UNIX,

BSD, and Solaris

Programming Languages

Firm understanding of programming (and reading) C, C++, Java, PHP, Intel

x86 Assembler, and Nessus Attack Scripting Language (NASL)

Experienced with penetration testing and code auditing against ASP.net,

Java, PHP, and C/C++

Experienced with reverse engineering C/C++ and ASP.net code

Working knowledge of Visual Basic, Javascript, Perl, and BASH Shell

Working knowledge of reading and writing malicious C, Intel x86 Assembler,

and Javascript code

Basic knowledge of Motorola 68k, SPARC, MIPS, ARM, Ruby, DirectX, and

Simple DirectMedia Layer (SDL)

Reverse engineering

Proficient with the use of disassemblers and debuggers

Experienced with reverse engineering network protocols

Working knowledge of reverse engineering cryptographic algorithms

Interests

Open Source Software development (especially the Nmap security scanner)

http://www.skullsecurity.org/wiki/index.php/My_Projects

Computer security, such as reading mailing lists and magazines and

maintaining a blog and wiki

http://www.skullsecurity.org/blog

http://www.skullsecurity.org/wiki

Reverse engineering and lock picking, out of general interest

Outdoor activities, such as camping, hiking, and going to the cottage

Computer, strategy, and role playing games

Indoor rock climbing

Running

Cycling

Exploring



Contact this candidate