Madeleine Massee
Security Engineer – Privacy Advocate
EXPERIENCE
Varonis, New York, NY — Federal Field Security Engineer October 2020 – PRESENT
Managing Federal’s most strategic Department of Defense territory to include the entire Pacific AOR, NATO, and UN business. Post sales responsible for 1 out of 7 DoD territories but overseeing 34% of the entire current customer base; yielding 1.5 million dollar Annual Recurring Revenue. For Fiscal Year 2022 pre-sales, secured an additional 2.7 million dollar ARR and achieved 244% in quota relief. Overall, the second most successful engineer in the entire Varonis organization for FY 2022. Team’s Subject Matter Expert in Threat Detection and Response – leading all cyber technical sales conversations. Consulting and acting as the trusted advisor in the security space to build resiliency, defense in depth, and a proactive Zero Trust Architecture. Briefing senior decision makers up to two-star Generals and Directors for Command, Control, Communications and Cyber Directorates. Additionally, guiding UN agencies as they transition to multi cloud offerings and wish to do so securely. Varonis, New York, NY — Incident Response Security Analyst June 2019 – October 2020
Reviewed and proactively conducted threat hunting exercises on an average of 30 strategic customer environments on a weekly basis uncovering risky technical configurations or behavioral abnormalities while also providing industry best practices that will harden systems and shrink the organization’s attack surface Uncovering threats ranging from: Ransomware, Insider Threats, Brute Force Campaigns, Malware, and APT attacks. IR serves as an extension to our customers’ security teams where we’re responsible for investigating threats within their architecture and being embedded within their security operations Oz Management, New York, NY — Information Security Analyst June 2018 – July 2019
Managed the Firm’s Security Manage Detection and Response solution and oversaw IPS/IDS, Network Infrastructure Monitoring, Vulnerability Scanning/Prioritization, Endpoint Detection, and Incident Response
Established Firms threat modeling and conducted risk analysis, determining executive risk appetite, system risk treatments, and application security risk assessments. Diagnosed environmental vulnerabilities and created actionable recommendations to protect the Firm by enhancing security controls
Reported directly to the CISO and routinely pitched new technological implementations to the C-Suite, accessed impact during Change Management Boards, and quarterly updated the Board’s cyber initiatives 1011 Walnut St.
Boulder, CO 80302
***************@*****.***
SKILLS
Threat Hunting: Detecting
abnormalities and uncovering
malicious scheduled tasks, GPO
changes, Kerberos tray manipulations,
proxies, and other TTPs that highlight
the exploitation of an environment. In
response, leveraging automated
scripts (Python/PowerShell) for
remediation
Penetration and Vulnerability:
Verifying the defenses and controls in
place and determining their
effectiveness following the MITRE
ATT&CK Enterprise Framework
Enterprise Cyber Security: Building
Zero Trust Architectures integrating
how to manage identities, devices, and
data, while leveraging UEBA and create
informed Policy Enforcement Points
and Data Loss Prevention programs.
Ensuring data integrity through
encryption. Knowledgeable in following
NIST frameworks and the like
referenced in ZTA, and apply security
controls to maintain confidentiality,
integrity, and availability
EDUCATION
Columbia University, New York,
NY — Computer Science,
Cybersecurity Policy & Law
US NAVY MILITARY SERVICE
July 2010 - July 2015
Established networks through reach-
back satellite comms to data traffic and
built remote command and control
centers to support the decision maker
Advocated and led a female
mentoring program for new recruits