Jay McGuerty
********@*****.*** 858-***-**** Franklin, TN www.linkedin.com/in/jay-mcguerty TS/SCI FS Poly
SUMMARY
20yrs Configuring Routers, Switches, Firewalls, MS/Linux admin, software development, software security, static/dynamic code analysis, web site and perimeter penetration testing, network security upgrades for the White House, designed and wrote defensive and offensive cyber security tools (.NET C#, Java, Python, PowerShell), Data Engineering, published security pocket guide author.
SKILLS
Java • .Net • C# • ASP • MVC • Linq • Python • OOP • PowerShell • HTML • CSS • JavaScript • TypeScript • React • ORM • MS-SQL • MySQL • Postgres • Oracle • MongoDB • XML • HTTP • API • RPC • SNYK • BURP Suite Pro • POSTMAN • SWAGGER • LAMP • JSON • REST • SOAP • BASH • Eclipse • Visual Studio • TFS • Jira• Jenkins • SonarQube • WordPress • Agile • Git • Splunk • SOC • Snort • SSH • PuTTY • Nikto • Nessus Tenable• ACAS • HBSS • Kali Linux • DAST • CICD • Nmap • HP Fortify • BURP Suite • FTK (Forensic Tool Kit) • OllyDbg • IDA • GDB • Cisco • NX-OS • Juniper • JUNOS • Palo Alto • PANOS • RHEL • FreeBSD • vSphere • vCenter • ESXI • IAM • SSO • OAuth • SAML • CorelDraw • TcpDump • Wireshark • SDN • SCADA • IoT • WAF • NIST RMF • DISA • OWASP • STIG • OSINT • BURP Suite • Metasploit • Malware Reversal • EJTAG • AZURE • KUSTO • DOCKER SSMS • DLP • TCP/IP • UDP • DNS • DHCP • SNMP • AAA • LDAP • RADIUS • TACACS+ • SIEM • DLP • SMTP • BGP • OSPF • EIGRP • NAT • IPSec • VLAN • VPN • TLS • PKI • X.509 • NAC • 802.1x
WORK EXPERIENCE
Leidos National Security San Diego, CA
Cyber Security Engineer May 2024 – Present
•Penetration testing backend of enterprise application
•SIEM dashboards
•Static code analysis, web API performance
IDEXX DevOps Engineer Nashville, TN
DevOps Engineer Jan – May 2024
•CI/CD DevOps, GIT, Visual Studio, .NET C#, SNYK static code analysis, BURP Suite Pro vuln testing, unit testing, Chrome developer tools for diagnosing application performance problems
•Managing framework upgrade from .Net 5 to .NET 8, resolving package dependencies, vulnerabilities, re-writing code
•Azure PaaS, Entra Identity, Threat Detection, Monitoring, Docker config CLI, Analysis, Microsoft Defender, Azure internal pen test capability, perimeter testing of public facing infrastructure, DNS, firewalls
Leidos C2 Cyber Security/Cyber Resiliency San Diego, CA
Cyber Security Engineer Mar 2018 – Dec 2023
•Developed and implemented cybersecurity applications with a focus on forensic scanning, authentication bypass, DDoS attacks utilizing multiple languages on Eclipse and Visual Studio, OOP, .NET C#, MVC, Java, Python, JavaScript, PowerShell, HTML, CSS, Razor Syntax, Agile
•Taught in-house and DoD customers Cisco Admin courses and Penetration Testing fundamentals
•Presenter at NAVY annual cyber symposium at SPAWAR
•Author of “Network Field Survival Guide” sold 10,000 copies
•BLUE and RED team enterprise level vuln security assessments, security policy recommendations
•Email Forensics, SMTP tracking, attacker identification, obfuscation techniques, IDS/IPS artifact signatures, running in debugger/BURP to observe and document malware methods
•Designed digital handwriting analysis tool using psychology, linguistics and human mechanics
•Designed MS SQL database schema validation tool for USAF written in .NET C#
•Designed a parser syntax language tool for SQL/Command injection testing using Python
•Designed a scanning log audit report tool including state code analysis using Python
•Designed an End Point Forensic Syslog SIEM with PowerShell, concentrating on anomalous memory and privilege use, applying forensic precedent/antecedent behaviors
•Splunk Administration, forwarder, indexer architecture, dashboard studio, event genome survey, CheckMk syslog integration, malicious behavior dashboards for comprehensive system monitoring in SOC
•Conducted VPN scanning and penetration testing using MITM techniques and false certification generation to evaluate and bolster security robustness, validate security policy, implement security controls
•Contributed to Cyber warfare planning, phase0a Infocon, 0b SIGINT/HUMINT/OSINT, 0c Calibrate. USC Title 10 Armed forces, Title 50 War and National Defense
•USAF TSAT satellite network management, control, data plane survivability
Leidos Security Risk Management Practice San Diego, CA
Principal Security Engineer Jan 2010 - Mar 2018
•Performed extensive penetration testing on various network infrastructures and web applications using both black and white box methodologies, successfully identifying and rectifying multiple potential vulnerabilities
•Managed 37 commercial and Department of Defense penetration engagements both remotely and on-site, with responsibility for compiling, presenting, and defending the final report
•Designed a robust satellite network security architecture with a focus on resilience to cyber attacks and proactive mitigation strategies for deficiencies in Control, Management, and Forwarding Plane protocols
SAIC NGIN PMO San Diego, CA
Solution Architect Aug 2000 - Jan 2010
•Oversaw the conceptualization and execution of the initial VoIP system for the President of the United States
•Incident response, Incident handling for a national stock trading firm, IAEA, DOD classified projects
•Conducted hardware hacking against Cisco Routers using EJTAG
•Team lead for the 'Proposition M' network modernization initiative for a large educational institution, involving infrastructure assessment, recommendation provision, and hardware installation
•Designed 'last mile' data solution, using FDD/TDD antenna duplexing solutions
EDUCATION
Parks College of St. Louis University
B.S. Aeronautics, Aircraft Maintenance Engineering
CERTIFICATIONS
•(ISC)2 Certified Information Systems Security Professional (CISSP #98465 11/31/2024)
•TrueCoders Software Engineering Web Development Full Stack Bootcamp
•Azure: Modern Monitoring and Management
•GIAC Exploit Research Advanced Penetration Tester (GXPN #414), Certified Forensic Examiner (GCFE #3123), GIAC Certified Penetration Tester (GPEN #6744, GIAC Certified Incident Handler (GCIH #18408), GIAC Certified Web Application Penetration Tester, (GWAPT #3257)
•Cisco CCSP/CCNP, Microsoft MCSE
•FAA Commercial Pilot, Aircraft Mechanic (airframe & powerplant)
Media Links
GitHub https://github.com/coastalgroove
CodeWars https://www.codewars.com/users/coastalgroove
NFSG https://www.thewayofthepacket.com
sHack1 https://www.youtube.com/watch?v=-6GDnl5tjs0
Languages
Spanish, Portuguese