Post Job Free
Sign in

Security Project

Location:
Ottawa, ON, Canada
Posted:
February 24, 2015

Contact this candidate

Resume:

Dan Bastianello

ITIL GREM

Email: ************@*****.***

Tel.: 613 • 797 • 5594

Profile

I have 15 years of IT working experience in a variety of business and technical environments, including

Federal Government Agencies and Leading IT Industries.

I have gained extensive experience and knowledge in a wide spectrum of IT disciplines, including:

9 years in IT/Network Security;

15 years in Systems Administration, Infrastructure and End User Support;

1 year in Business Analysis and Database Administration;

2 years in Software Programming

Employment

Dec 2014 – Present NEPS – Network End Point Security

Department of National Defense.

Oct 2011 – Nov 2014 FIPC – Network intrusion Analyst

Public Works Government Services Canada.

Sep 2009 – Jun 2010 CCIRC – Malware Reverse Engineer Analyst

Public Safety Canada.

Jun 2008 – Aug 2009 IT Transformation Project – Business Analyst / DBA

The Bank of Canada.

Jun 2005 – May 2008 Security Operations Centre – IT Security Specialist

CGI Group, Inc.

Nov 1999 – Nov 2004 Network and User Support Administrator

Thales Systems Canada.

1

IT/IM Experience

Department of National Defense.

NEPS – NAT End Point Security Dec 2014 – Present

I am currently responsible for developing and testing policies and implementation strategies. Several

technologies are used to provide a layered approach to endpoint security which require duplicating

PROD environments in VM. My main duties are to build VM's replicating all the services that the hosts

provide in PROD and testing out new security products delivering this to the penetration testing team

which provides feedback on the results of their findings.

Duties included:

Building virtual machines replicas of PROD environment hosts.

Developing endpoint security policies.

Testing endpoint implementations against all services within PROD.

Providing UAT environments to end user test groups and penetration testing teams

Occasionally perform malware reverse engineering on samples provided to aid end point security

vendors with analysis to aid in further improving their products

Provide build books and end user documentation.

Provide monthly statistics on incidents and tasks

Provide guidance on deployment of future technologies.

Public Works Government Services Canada.

FIPC – Network intrusion Analyst Oct 2011 – Nov 2014

Currently I am working as part of the Government of Canada's Federal Intrusion Protection Center

(FIPC). My main duty is to research and evaluate threat level and validity of events generated by the

Host Intrusion Detection System (HIDS) and Network Intrusion Detection System (NIDS) sensors. As

part of the monitoring group I also review and recommend changes to User Defined Signatures (UDS)

implemented on the NIDS system.

Duties included:

Monitoring the FIPC infrastructure security events through HIDS and NIDS event systems.

Monitoring health of FIPC Infrastructure and attempt to troubleshoot if any issues come up.

Update signatures on the FIPC sensors.

Generate tickets providing detailed analysis of occurred events and provide recommendations on the

resolution of the captured event.

Research techniques used when attempts to infiltrate hosts to provide a thorough analysis of intent.

Create User Defined Signatures (UDS) for NIDS.

Generate reports on current or historical events.

Public Safety Canada.

CCIRC – Malware Reverse Engineer Analyst Sep 2009 – Jun 2010

I worked as part of the Government of Canada's computer incident response team (CIRT). My main

duty was to analyze and reverse engineer malicious software submitted from all government of Canada

2

departments allowing a quick repeatable methods to contain any computer virus infection before

causing harm. Other tasks while working on this project was Linux system analyst, data recovery,

secure disk wiping, system design, virtual machines (VM), Internet research, creating technical/design

documentation, scripting and small purpose tools. I was also involved in a weekly security update

teleconference between all government of Canada departments providing advice, research, and

expertise.

Duties included:

Performed malware reverse engineering on physical and virtual environments.

Performed code analysis using real-time and static debuggers (OllyDBG and Ida Pro).

Performed behavioral analysis using several open and closed source tools and loggers.

Generated reports on the findings and analysis performed while reverse engineering the malware

submissions providing back assistance in containing an incident.

Created and developed a standardized malware report template.

Deployed virtual machines and physical hosts to perform malware analysis using disk imaging for

physical hosts and snapshots for virtual hosts.

Provided digital fingerprint values allowing for positive identification of infected systems.

Provided removal procedures to eradicate malware and virus infections.

Performed troubleshooting of CIRT servers and lab environments.

Reviewed system logs for errors and irregularities.

Developed submissions scripts allowing for an easier process also adding the ability of any failed

submissions.

Development of tools to aid in analysis using Java and Python.

Performed data recovery and disk analysis of infected disks and mobile devices

Gathered requirements from government representatives for the next generation ticketing/alert system.

Researched OSSIM as a new out-of-the-box security information management system solution to

replace the antiquated and legacy systems.

Worked on how-to and best practices documentation on features, requirements, implementation and

deployment of a security information management system.

The Bank of Canada.

IT Transformation Project – Business Analyst / DBA Jun 2008 – Aug 2009

I was working as part of the IT Transformation Project I was responsible for several duties over the 14

months from business analyst to Technical architect. While working on this project I was responsible

for data gathering to help with project time line, projections and budget. Involved in reviewing

technical deliverables, design documentations, interviewing clients to gather requirements, correlating

requirement, generating reports and developed testing strategy /QA process.

Duties included:

Developed User to Hardware/Software inventory from Novell eDirectory, Microsoft Active Directory and

PatchLink.

Developed Oracle database CMDB for software to end user to hardware asset licensing and

assignment.

Regularly generated reports from the database to excel/PDF for meetings and management to help in

assess budget requirements.

Data modeling of asset management system used in identification of VM vs Desktop and gap analysis.

Involved in several client, project management and senior management meetings (bilingual) to take

minutes to aid in documenting requirements.

Analyzed and rationalized applications to standardize and reduce the number of supported software in

3

the environment.

Interviewed clients for asset and licensing requirements.

Part of a team that developed Active Directory architecture by designing and customizing Group Policy

Object for a managed user environment through SCCM.

Part of a team that design and development of security implementation using two factor authentication

RSA USB smart FOB.

Provided hardware and software requirements and performed data analysis to develop the QA

environments.

Developed test scenarios for QA of the new platform being rolled out.

Performed software coexistence testing to decide which applications are rationalized.

Performed troubleshooting errors and deviations during failed test scenarios.

Developed migration scripts for deployment purposes.

Lead in the End User Platform deployment execution and next day support.

Assisted in developing a central repository CMDB for all user hardware and software inventory.

CGI Group, Inc.

Security Operations Centre – IT Security Specialist Jun 2005 – May 2008

I was working as part of a dedicated team within the CGI Security Operations Center (SOC),

responsible for supporting IT Security infrastructure, for investigating security related events through

NIDS, and performing online/offline forensics and vulnerability assessments of over 400

Unix/Windows servers.

Duties included:

Monitoring, and analyzing network packets and system activity through firewalls, IDS, IPS, HIPS, HIDS,

detecting and responding to intrusions and security breaches.

Monitored and tracked Penetration Testing audits performed internally.

Determining false/positive events of servers through full investigation (i.e. RDP/SSH to servers and

pulling information from the logs and determining if any changes have occurred, what had been

accessed or changed).

Researching security threats and performing a threat analysis on the systems in place within the

networked environment.

Performing daily system integrity checks on Windows and Unix servers using Tripwire and Power

Broker.

Created weekly and monthly reports for internal and external clients.

Developing internal procedures as new projects are implemented.

Documented problems and security threats using the Remedy ticketing system.

Thales Systems Canada.

Network and User Support Administrator Nov 1999 – Nov 2004

I was responsible for providing client/server and network information system support. Main duties

were routine tape backups, client desktop support, network design/support, client/server

setup/maintenance/patching and end user documentation/training.

Duties included:

Maintained Solaris 8, Novell 4/5/6, Windows NT/2000/XP/2003, MS Exchange 5.x/2000, Novell

GroupWise 5/6, Novell Zenworks, Novell eDirectory, firewall/VPN’s, upgrade rollouts, security audits,

and RAID configurations within the server environments.

4

Installed and maintained Microsoft Windows, MS Office, Accpac System, Pervasive SQL, Adobe

productivity tools, installing hardware peripherals and troubleshooting software/hardware problems.

Responsible for developing cross platform database driven web pages using HTML/ASP and

maintaining the intranet and Internet web servers (IIS and Apache implementations).

Involved in setting up and integrating the systems used and network design/configurations for the

Mediolis (an Internet based tele-medicine) project for demonstration in North America.

Supported an Oracle 8/web driven configuration management database called CMStat.

Regular performance checks, implementing SSL encryption for web component of CM tool, IIS security

implementations, tape backups and performed server/client side upgrade rollouts.

Implemented several LAMP setups for projects and intranets.

Provided technical expertise to the development team mostly Linux systems analyst support

Provided technical consulting for Thales on the Canadian Military’s Athena Tactical Station (ATS).

Traveled routine trips to remote sites for upgrades, system integration, documentation, training, technical

consulting, maintenance and demonstrations using Compaq Proliant NT4/2000/Exchange network

domain.

Created product training manuals such as GroupWise, MS Office, Internet Explorer, PGP encryption and

VPN connection setups.

Responsible for setting up and maintaining Solaris 8 based systems for an HF email system/software for

the Canadian military.

Regularly performed internal network security audits using various tools (i.e. LANGuard, NMap and

snort).

Created scheduled disk images of notebook, workstations and servers for backups and testing purposes

using Norton Ghost.

Provided engineers with technical specifications and test environment configurations which included real

time systems, experimental military hardware, VOIP systems, and digital phone switching equipment.

Carleton University, Software Engineering.

Software Programmer Sep 2011 – Present

I have gained 1.5 years of C and 6 months of Java while studying at Carleton:

First year: C(A+), Java(A-)

Second year: C(A+), Matlab(B+)

School Projects:

As a network intrusion security analyst I often require to analyze captured packets that are obfuscated

using ASCII or Unicode values which slows down the process of analysis. Having recently taken a Java

course I decided to write myself a tool to aid in de-obfuscation. The tool called Multicon started as a

Java console tool and eventually evolved into a multi-platform (Windows and Linux) Python GUI tool.

Having read good things about python and wanting to learn more OOP languages I decided to go

through all 52 lessons from learnpythonthehardway.org. This and my previous Java class taught me

enough OOP to create a very useful text parsing/conversion tool.

A second personal project I have worked on was getting my special 3 part back-light keyboard to work

under Linux by writing a USB driver. Luckily there was already a partially working project that was written

in go Language. I had to modify sections of this code to allow for command line switches to be added to

a compiled binary allowing me to launch this drive on desktop login

(http://www.msi.com/product/nb/GX60-3CC-Destroyer.html).

5

Education/Training/Skills

Software Engineering, BSc (Part-Time) Sep 2011 – Present

Carleton University, Ottawa, ON

GIAC Reverse Engineering Malware (GREM) Certification Jul 2009 – Jul 2009

The SANS Institute, Ottawa, ON

ITIL Certification Mar 2007 – Mar 2007

Loyalist College, Belleville, ON

Computer Networks Engineering Technology Diplomas Sep 1997 – Sep 1998

RCC Institute of Technology, Toronto, ON

Electronics Engineering Technician Diplomas Mar 1996 – Mar 1997

RCC Institute of Technology, Toronto, ON

Skills and Tools

HARDWARE Development Tools

Sonicwall IBM Eclipse

Sun Microsystems JetBrains IntelliJ IDEA Community Edition

Cisco JetBrains PyCharm

Intel Oracle Netbeans

AMD/ATI Code::Blocks IDE

OEMs (Dell/HP) CodeLite

NAS Notepad ++

RAID (Hardware and Software) Any text editor with language based highlighting

OS

COTS

Microsoft Windows all Client/Server versions

Microsoft Office, Exchange, AD, GPO and SCCM.

Debian/Ubuntu

OpenSource (LibreOffice, Apache, LAMP, Gimp)

Redhat/CentOS

Virtual Machines (VMWare, VirtualBox, QEMU)

Android

Anti-virus Symantec and McAfee

Solaris/Sun OS

Disc encryption (McAfee)

IBM AIX

Data recovery (RipLinux, Ontrack, Gparted, R-

Studios)

HIDS/NIDS (HP Arcsight, McAfee NSM, Trend

Micro DSM, Cisco, Checkpoint, Enterasys, snort)

Languages

Debuggers (OllyDBG, Ida Pro)

C/C++

Java

Python

Cloud Systems

goLang

Ubuntu MAAS

Docker/LXC

Mirantis OS

Reference

Available upon request

6



Contact this candidate