Post Job Free
Sign in

Administrative Assistant It Technician

Location:
Los Angeles, CA
Salary:
60-80,000
Posted:
July 14, 2022

Contact this candidate

Resume:

Chris Glanzer

605-***-****

*******.***********@*****.***

EDUCATION

Dakota State University’s Beacom College of Computer & Cyber Sciences Madison, SD B.S. majoring in Cyber Operations Dec. 2021

SKILLS

Software Literacy: nasm, C, C++, C#, Java, Python, PHP, SQL, HTML/XML, CSS, Javascript

Familiar operating environments: Windows, Security Onion, Kali, Ubuntu

Penetration testing, vulnerability scanning, Network Security assessments: o Familiar with MITRE ATT&CK Matrix

o Experience with all phases of the PT process and various tools used throughout including but not limited to:

Recon:

• social engineering,Google dorks, GHDB, Searchdiggity, whois, dnslookup / host, shodan. Maltego, FOCA, Metagoofil, theHarvester, Recon-ng, ARIN & InterNIC, NetCraft, Touchgraph, SMTP bounce / ip2location.com, Paros, Netcat, BILE, Httrack, Packettotal, gOSINT, creepy, Whatbreach,

Scanning / footprinting:

• Fping, nmap, Nessus, Nexpose, openvas, Nikto, fuzzyDB, Maltego, Foca,

Exploitation

• Metasploit, and the Metasploit scripting framework (msf)

Post Exploitation / Persistence / Pivoting / extraction / removing evidence

• privelege escalation using Meterpreter & token impersonation, Hashdump, Hashcat / mimicatz, rtgen, psexec, clearev,

Reverse Engineering & Malware Analysis:

o Familiar with both PE and ELF file formats, and both linux and windows disassembly and analysis toolsets including but not limited to: readelf, Gdb + PEDA (python extendable analysis environment), Ollydbg, Windbg, Binary Ninja, IDA, Ghidra. dnSpy, various Hex viewers / editors o Practiced in static and dynamic disassembly methods as well as binary, control flow, and data flow analysis approaches

o Experience writing IDS signatures and corresponding log messages & alerts for Snort and Suricata o Highly honed critical thinking and root cause analytical capacities.

General software security assessments and software security design analysis: o Experience researching targeted software and hardware for known weaknesses and vulnerabilities (CWE’s & CVE’s) using publicly available resources such as: OWASP, CWE, NVD and OSVDB o Experience exploiting common vulnerabilities including but not limited to: Buffer overflows, Externally Controlled Format Strings, weak crypto & predictable randomness, various race conditions, sql injection, XSS, password cracking / poor password storage means, command injection, CSRF, and instances of Use after Free. o Experience testing different attack vectors including network / remote. Local / internal. And physical attack vectors.

Web-application security assessments:

o Extensive experience with bypassing client side controls and assess server-side controls guarding against a variety of common vulnerabilities including but not limited to: broken authentication, broken access controls, sql injection, XSS, CSRF, and general information leakages. o Experience with tools in this area including but not limited to: Burp, Zap, John the ripper, Nmap, Nessus, Nikto o Experience following OSSTMM methodology while abiding PTES guidelines during the course of an assessment

Networking, Routing, Switching, Firewalling, Monitoring, and Traffic analysis: o Familiar with stateful and stateless firewalling technologies o Familiar with Network traffic analysis methods, both at packet level and network level o Experience with technologies including but not limited to: Wireshark, Networkminer, tcpdump, tshark, dumpcap, Argus & Ra client, squil, snorby, squirt, elsa, Capme, cyberchef, o Experience with Network Monitoring technologies such as: netsniff, snort, zeek/bro, OSSec o Experience with SIEM dashboards and logging environments such as: elastic stack (elasticsearch, logstash, kibana) and splunk

o Experience with cisco, junos, Palo Alto and pfsense routing and switching operating systems and their corresponding environments

EXPERIENCE

Infosys Rosemead, CA Feb. 2022 – Present

Software Developer / Delivery Stream

Develop code and document artifacts including unit test plans and ensure that the output is as per the given specifications and service-level agreements

Perform testing activities (functional, integration, system, user experience) based on the plans and in line with defined processes with guidance from supervisor

Work on ‘Go Live’ activities as per the Implementation plan to enable production of application without any issues

Respond to Issues as per SLA

Responds to the issues assigned, conduct analysis, suggest / implement workarounds, communicate to all the stakeholders and close issues as per the agreed timelines in order to ensure support availability as per agreed SLAs

Document and share own learnings from own module, seek information and leverage knowledge from other modules in order to drive high efficiency and effectiveness

Midco Aquatic Center Sioux Falls SD Apr. 2018 – Dec 2022 Administrative Assistant / Receptionist

Win Chill Sioux Falls, SD Aug. 2019 – Dec. 2019

IT Technician

Previous Employment Sioux Falls, SD July 2014 – Aug. 2018 Multiple Positions

Hy-Vee / food service: Deli, Chinese, Italian

Monsanto Agrochemical Company / Corn Breeder.

Fuddruckers / Line Cook

ACTIVITIES

NSA Codebreaker Challenge Sept. 2017- 2020

DSU Computer Club Aug. 2016 – May 2017

DSU Defensive Network Security Club Aug. 2016 – Dec. 2017 DSU Offensive Network Security Club Aug. 2016 – May 2017



Contact this candidate