Chris Glanzer
*******.***********@*****.***
EDUCATION
Dakota State University’s Beacom College of Computer & Cyber Sciences Madison, SD B.S. majoring in Cyber Operations Dec. 2021
SKILLS
Software Literacy: nasm, C, C++, C#, Java, Python, PHP, SQL, HTML/XML, CSS, Javascript
Familiar operating environments: Windows, Security Onion, Kali, Ubuntu
Penetration testing, vulnerability scanning, Network Security assessments: o Familiar with MITRE ATT&CK Matrix
o Experience with all phases of the PT process and various tools used throughout including but not limited to:
Recon:
• social engineering,Google dorks, GHDB, Searchdiggity, whois, dnslookup / host, shodan. Maltego, FOCA, Metagoofil, theHarvester, Recon-ng, ARIN & InterNIC, NetCraft, Touchgraph, SMTP bounce / ip2location.com, Paros, Netcat, BILE, Httrack, Packettotal, gOSINT, creepy, Whatbreach,
Scanning / footprinting:
• Fping, nmap, Nessus, Nexpose, openvas, Nikto, fuzzyDB, Maltego, Foca,
Exploitation
• Metasploit, and the Metasploit scripting framework (msf)
Post Exploitation / Persistence / Pivoting / extraction / removing evidence
• privelege escalation using Meterpreter & token impersonation, Hashdump, Hashcat / mimicatz, rtgen, psexec, clearev,
Reverse Engineering & Malware Analysis:
o Familiar with both PE and ELF file formats, and both linux and windows disassembly and analysis toolsets including but not limited to: readelf, Gdb + PEDA (python extendable analysis environment), Ollydbg, Windbg, Binary Ninja, IDA, Ghidra. dnSpy, various Hex viewers / editors o Practiced in static and dynamic disassembly methods as well as binary, control flow, and data flow analysis approaches
o Experience writing IDS signatures and corresponding log messages & alerts for Snort and Suricata o Highly honed critical thinking and root cause analytical capacities.
General software security assessments and software security design analysis: o Experience researching targeted software and hardware for known weaknesses and vulnerabilities (CWE’s & CVE’s) using publicly available resources such as: OWASP, CWE, NVD and OSVDB o Experience exploiting common vulnerabilities including but not limited to: Buffer overflows, Externally Controlled Format Strings, weak crypto & predictable randomness, various race conditions, sql injection, XSS, password cracking / poor password storage means, command injection, CSRF, and instances of Use after Free. o Experience testing different attack vectors including network / remote. Local / internal. And physical attack vectors.
Web-application security assessments:
o Extensive experience with bypassing client side controls and assess server-side controls guarding against a variety of common vulnerabilities including but not limited to: broken authentication, broken access controls, sql injection, XSS, CSRF, and general information leakages. o Experience with tools in this area including but not limited to: Burp, Zap, John the ripper, Nmap, Nessus, Nikto o Experience following OSSTMM methodology while abiding PTES guidelines during the course of an assessment
Networking, Routing, Switching, Firewalling, Monitoring, and Traffic analysis: o Familiar with stateful and stateless firewalling technologies o Familiar with Network traffic analysis methods, both at packet level and network level o Experience with technologies including but not limited to: Wireshark, Networkminer, tcpdump, tshark, dumpcap, Argus & Ra client, squil, snorby, squirt, elsa, Capme, cyberchef, o Experience with Network Monitoring technologies such as: netsniff, snort, zeek/bro, OSSec o Experience with SIEM dashboards and logging environments such as: elastic stack (elasticsearch, logstash, kibana) and splunk
o Experience with cisco, junos, Palo Alto and pfsense routing and switching operating systems and their corresponding environments
EXPERIENCE
Infosys Rosemead, CA Feb. 2022 – Present
Software Developer / Delivery Stream
Develop code and document artifacts including unit test plans and ensure that the output is as per the given specifications and service-level agreements
Perform testing activities (functional, integration, system, user experience) based on the plans and in line with defined processes with guidance from supervisor
Work on ‘Go Live’ activities as per the Implementation plan to enable production of application without any issues
Respond to Issues as per SLA
Responds to the issues assigned, conduct analysis, suggest / implement workarounds, communicate to all the stakeholders and close issues as per the agreed timelines in order to ensure support availability as per agreed SLAs
Document and share own learnings from own module, seek information and leverage knowledge from other modules in order to drive high efficiency and effectiveness
Midco Aquatic Center Sioux Falls SD Apr. 2018 – Dec 2022 Administrative Assistant / Receptionist
Win Chill Sioux Falls, SD Aug. 2019 – Dec. 2019
IT Technician
Previous Employment Sioux Falls, SD July 2014 – Aug. 2018 Multiple Positions
Hy-Vee / food service: Deli, Chinese, Italian
Monsanto Agrochemical Company / Corn Breeder.
Fuddruckers / Line Cook
ACTIVITIES
NSA Codebreaker Challenge Sept. 2017- 2020
DSU Computer Club Aug. 2016 – May 2017
DSU Defensive Network Security Club Aug. 2016 – Dec. 2017 DSU Offensive Network Security Club Aug. 2016 – May 2017