Post Job Free

Resume

Sign in

Information Technology Security

Location:
Tupelo, MS, 38804
Salary:
65,000+
Posted:
December 13, 2017

Contact this candidate

Resume:

s _

* +

**/**** - *******

r +

**/**** - **/****

r +

r 2014 - ongoing

/

A

B

C

D

E

F

G

A

B

C

D

E

F

G

P

P

www.enhancv.com Powered by /

LUTHER "CHIP" HARRIS

Cyber-Security Expert, Ethical Hacker and Proud Geek 901-***-**** ac3o79@r.postjobfree.com

https://www.linkedin.com/in/chip-harris-49

872035/

Memphis, Tn and Remote Locations

EXPERIENCE

Senior Information Security Engineer

Sonic Health Care USA

Memphis TN and Sydney, Australia

Sonic Healthcare USA (SHUSA) was formed in 2007 as the umbrella organization overseeing Sonic Healthcare Ltd’s operation in the United States. At present there are nine divisions within SHUSA. Assisted with development, implementation and maintenance of IT security solutions including firewalls, web proxies and filtering, email security, web application firewalls, intrusion detection / prevention, identity management. Manages Windows and Linux servers and appliances in the DMZ, AD, DNS, IIS, and Apache.

Successfully Pen-Tested SHUSA over a 7 month period and created a remediation plan for all issues found. Fixed and saved the company 4.2 million dollars over 3 quarters .

Senior Security, Server, Desktop, Cloud and

Administrative Support

Informa Economics IEG

Memphis, TN and London, England

The leader in global agribusiness intelligence, we cover the entire value chain, helping you stay close to the market so you can anticipate changes.

Reasonable for all network, servers and desktop administration services. I help plan, implement, oversees and maintain all the servers, desktops, network infrastructure and projects in the local Memphis HQ and Amazon Cloud based environment

Provide technical and procedural direction to the company for the actual implementation of the network servers used, as well as interface with internal users, development personnel and other technical staff. EDUCATION

Master’s Degree and Certification

US ARMY WAR College

GPA

5.8 6.00

A DAY OF MY LIFE

Pen-Testing

Ethical Hacking /Digital Forensic

Documentation and Remediation

Client Interface and Project Reporting /

Brainstorming

Meetings / Sprint Follow ups and Project

Assessments

Reading and Research

Investigating Corporate Espionage and

Counter Surveillance

ACHIEVEMENTS

What are you most proud of?

Achieving new certifications and learning

new things about IT Security and INFO-

SEC issues within the IT Community.

What are you most proud of?

Achieving a 3 year goal in the Military

Distance Learning program which I

received the -DISA Certification of

Compliance and Trainer for Cyber Security, Cyber Crime, Risk Analysis,Counter

Intelligence and Signal Intelligence.

r 2007 - ongoing

r 2001 - ongoing

2017

r +

2017

r +

C EH-Ethical Hacking

CPT Penetration Testing

CFCE Certified Forensic Computer

Examiner

Documentation

Meetings and Follow-ups

Resarch and Investigation

Publication of Findings -NIST ISO

PCI

www.enhancv.com Powered by /

VOLUNTEER

Memphis 2600 - President

Organization Name

Why do we hack? Is it to alter webpages and leave some type of cybergang inner-city graffiti? Is it to laugh in the face of over paid, under qualified sysadmins? Well for myself, and everyone I associate with, the answer to both of those would be no. So then, why do we do it? To seek knowledge? Perhaps...

That is definitely an overused and somewhat groundless excuse. We seek knowledge and wisdom every waking moment. Every breath we inhale leases us another 3 seconds of learning. Yes breaching a network's security does without a doubt involve learning. Yet do we not, on occasion, breach systems using exactly the same the same method as we have used previously? So in that case, why do we do it? If you have broken one NT box by guessing the Administrators password, why would we do it again to a different NT machine? Have we not already learned how to use an IPC$ share to gain the name of the re-named Admin account? We already know how to glean hidden shares from the afore mentioned null connection. What are we learning from repeating the task? Nothing. So why then? I suppose the first few times, is in the hope that you will run into a new challenge.

Senior Subject Matter Expert

Defense Advanced Research Projects Agency (DARPA)

The Information Innovation Office (I2O) aims to ensure U.S. technological superiority in all areas where information can provide a decisive military advantage.

PLAN X

Plan X is a foundational cyberwarfare program to develop platforms for the Department of Defense to plan for, conduct, and assess cyberwarfare in a manner similar to kinetic warfare. Towards this end the program will bridge cyber communities of interest from academe, to the defense industrial base, to the commercial tech industry, to user-experience experts.

Plan X will not develop cyber offensive technologies or effects. National policymakers, not DARPA, will determine how the cyber capabilities developed under Plan X will be employed to serve the national security interests of the United States.

STRENGTHS

Your Unique Talent

I have patience and experience with that a person can accomplish anything.

Your Unique Talent

I think bad but I do good.

PROJECTS

How to Make a Homemade -

Super Computer -Maker Project

Memphis, TN

Working with others in the Memphis IT

Community to build a Super Computer under

$5,000 USD.

Working with local Memphis User Groups for

networking and problem solving of how to

make nodes and work with GPU Hyper-

Threading.

The Zero-Sum-Game

Remote Location - Classified

Cyber Security Deposition - Joint Chiefs of Staff

Pentagon - NSA

A assessment of Data Mining or knowledge

discovery for online analytical processing

(OLAP) In cooperation with OPSEC / JSOC.

Dealing with advanced training for Cyber

Security and Counter-terrorism with data

mining used for offensive and defensive

purposes

TECHNOLOGIES

Front -End

Back-End



Contact this candidate