s _
* +
r +
r +
r 2014 - ongoing
/
A
B
C
D
E
F
G
A
B
C
D
E
F
G
P
P
www.enhancv.com Powered by /
LUTHER "CHIP" HARRIS
Cyber-Security Expert, Ethical Hacker and Proud Geek 901-***-**** ****************@*****.***
https://www.linkedin.com/in/chip-harris-49
872035/
Memphis, Tn and Remote Locations
EXPERIENCE
Senior Information Security Engineer
Sonic Health Care USA
Memphis TN and Sydney, Australia
Sonic Healthcare USA (SHUSA) was formed in 2007 as the umbrella organization overseeing Sonic Healthcare Ltd’s operation in the United States. At present there are nine divisions within SHUSA. Assisted with development, implementation and maintenance of IT security solutions including firewalls, web proxies and filtering, email security, web application firewalls, intrusion detection / prevention, identity management. Manages Windows and Linux servers and appliances in the DMZ, AD, DNS, IIS, and Apache.
Successfully Pen-Tested SHUSA over a 7 month period and created a remediation plan for all issues found. Fixed and saved the company 4.2 million dollars over 3 quarters .
Senior Security, Server, Desktop, Cloud and
Administrative Support
Informa Economics IEG
Memphis, TN and London, England
The leader in global agribusiness intelligence, we cover the entire value chain, helping you stay close to the market so you can anticipate changes.
Reasonable for all network, servers and desktop administration services. I help plan, implement, oversees and maintain all the servers, desktops, network infrastructure and projects in the local Memphis HQ and Amazon Cloud based environment
Provide technical and procedural direction to the company for the actual implementation of the network servers used, as well as interface with internal users, development personnel and other technical staff. EDUCATION
Master’s Degree and Certification
US ARMY WAR College
GPA
5.8 6.00
A DAY OF MY LIFE
Pen-Testing
Ethical Hacking /Digital Forensic
Documentation and Remediation
Client Interface and Project Reporting /
Brainstorming
Meetings / Sprint Follow ups and Project
Assessments
Reading and Research
Investigating Corporate Espionage and
Counter Surveillance
ACHIEVEMENTS
What are you most proud of?
Achieving new certifications and learning
new things about IT Security and INFO-
SEC issues within the IT Community.
What are you most proud of?
Achieving a 3 year goal in the Military
Distance Learning program which I
received the -DISA Certification of
Compliance and Trainer for Cyber Security, Cyber Crime, Risk Analysis,Counter
Intelligence and Signal Intelligence.
r 2007 - ongoing
r 2001 - ongoing
2017
r +
2017
r +
C EH-Ethical Hacking
CPT Penetration Testing
CFCE Certified Forensic Computer
Examiner
Documentation
Meetings and Follow-ups
Resarch and Investigation
Publication of Findings -NIST ISO
PCI
www.enhancv.com Powered by /
VOLUNTEER
Memphis 2600 - President
Organization Name
Why do we hack? Is it to alter webpages and leave some type of cybergang inner-city graffiti? Is it to laugh in the face of over paid, under qualified sysadmins? Well for myself, and everyone I associate with, the answer to both of those would be no. So then, why do we do it? To seek knowledge? Perhaps...
That is definitely an overused and somewhat groundless excuse. We seek knowledge and wisdom every waking moment. Every breath we inhale leases us another 3 seconds of learning. Yes breaching a network's security does without a doubt involve learning. Yet do we not, on occasion, breach systems using exactly the same the same method as we have used previously? So in that case, why do we do it? If you have broken one NT box by guessing the Administrators password, why would we do it again to a different NT machine? Have we not already learned how to use an IPC$ share to gain the name of the re-named Admin account? We already know how to glean hidden shares from the afore mentioned null connection. What are we learning from repeating the task? Nothing. So why then? I suppose the first few times, is in the hope that you will run into a new challenge.
Senior Subject Matter Expert
Defense Advanced Research Projects Agency (DARPA)
The Information Innovation Office (I2O) aims to ensure U.S. technological superiority in all areas where information can provide a decisive military advantage.
PLAN X
Plan X is a foundational cyberwarfare program to develop platforms for the Department of Defense to plan for, conduct, and assess cyberwarfare in a manner similar to kinetic warfare. Towards this end the program will bridge cyber communities of interest from academe, to the defense industrial base, to the commercial tech industry, to user-experience experts.
Plan X will not develop cyber offensive technologies or effects. National policymakers, not DARPA, will determine how the cyber capabilities developed under Plan X will be employed to serve the national security interests of the United States.
STRENGTHS
Your Unique Talent
I have patience and experience with that a person can accomplish anything.
Your Unique Talent
I think bad but I do good.
PROJECTS
How to Make a Homemade -
Super Computer -Maker Project
Memphis, TN
Working with others in the Memphis IT
Community to build a Super Computer under
$5,000 USD.
Working with local Memphis User Groups for
networking and problem solving of how to
make nodes and work with GPU Hyper-
Threading.
The Zero-Sum-Game
Remote Location - Classified
Cyber Security Deposition - Joint Chiefs of Staff
Pentagon - NSA
A assessment of Data Mining or knowledge
discovery for online analytical processing
(OLAP) In cooperation with OPSEC / JSOC.
Dealing with advanced training for Cyber
Security and Counter-terrorism with data
mining used for offensive and defensive
purposes
TECHNOLOGIES
Front -End
Back-End