Here's what I've been doing for the last twenty-five or so years...
- Integration and Automation (multi-language: Python, PowerShell, etc.)
- SIEM Prevention and Detection Engineering and Analysis
- Reverse Engineering Malware
- Blackberry Cylance (Protect, Optics)
- Splunk (Splunk Enterprise, Splunk Cloud)
- Mac OS X 10.5 – 10.10.5, 10.11 - 10.12.3, 11.1
- Windows: 3.1, 95, 98, CE, 2000, XP, Vista, 7, 10, 10H2, Server NT4/2000/2003/2008R2/2012R2/2016/2019
- Linux Distributions: Slackware, Redhat, CentOS, Ubuntu, Raspbian, various LiveCDs
- Security Distributions: BackTrack, Kali, ParrotOS, REMnux, FLARE VM, Commando VM, SecurityOnion, various LiveCDs
- Others include MS-DOS 6.22, DRDOS, BIGDOS, ChromeOS, HP-UX, AIX, VAX, *BSD, Unix System V
- Cisco IOS, Juniper JunOS, 3Com OS
- Apple IOS, Android, Raspbian
- Hyper-V HyperVisor, VMWare ESX/i, VMWare Workstation Pro, VMWare Fusion Pro, VirtualBox, Virtual PC
- Unicenter, BMC, STIX, Sharepoint, LiveTime, BMC Track-It, DeMisto/Cortex XSOAR, Service Now
- MS Visual Studio 6, InstallShield 6-11, VS.NET, XCode, Postman, PyCharm, PHPStorm, VSCode, Eclipse, UEStudio
- C, C++, C#, Turbo Pascal, BASIC, GW-BASIC, Quick Basic, Visual Basic, GoLang,
x86 Assembler (MASM), ObjectiveC, Java, WSH, VBScript, perl, DOS Batch/Command,
JavaScript, Python, Ruby, InstallScript, ActionScript, AppleScript, bash, Shell Script,
HTML, XML, CSS, ASP, PHP, PowerShell, NodeJS
- Wired and Wireless (802.11 a/b/g/n/ac), Internet, LAN, WAN, VPN,
reverse engineering, malware analysis/generation,
cryptography(encryption/decryption/obfuscation), binary vulnerability/exploitation,
web application vulnerability/exploitation, forensics, fuzzing,
open source security tools, penetration testing, security assesment,
network security monitoring, custom hacking and security tools,
surveillance, reconnaissance, countermeasures, social engineering
IoT, clouded services
- Windows Active Directory and GPO, VNC remote software, RDC, Examsoft, Datatel,
Polycom videoconferencing, clouded web services.
- Managed 3Com switches, Cisco Switches/Routers/Appliances/IDS/IPS, Juniper Switches, Frame Routers, Avocent RKVM, Cisco Meraki Wireless
- Palo Alto
- Splunk (Enterprise, Cloud)
- Alien Vault
- ELK Stack: Elasticsearch, Logstash, Kibana
- Okta Authentication
- Accellion Kiteworks
- Armis
- Blackberry Cylance
- Flashpoint Intel
- HISAC
- Palo Alto Networks
- Proofpoint
- Tenable Nessus
Research and development of PKI security products including smart card and biometric
API/Scraping, Programmatic Automation, Testing and Tool Building
Raspberry Pi, 3Com IntelliJack Switch NJ220, Hak5 devices
Information Security, Cryptography, Malware R&D, Digital Forensics, Programming,
Software Development, Hacking, Physical Security,
Electronics: Electronic Technology (analog and digital circuits),
Lockpicking, OSX, iOS, Android, Ham Radio Operator (Technician Class),
IDPA Competitive Shooting, NRA Member, Freelance Writer For Milton Security Group,
Hakin9 It Security Magazine, Securemac, Pentest Magazine, Infosec Institute,
Eforensics Magazine, Blacklisted!411 Magazine,
Videogaming (Console: Xbox One, Games: RPG,FPS, OSX:SecondLife), Motorcycling,
Moto-Gymkhana, Brass Musician, English, Arabic (MSA), Spanish, Cigar Connoisseur,
Dungeons and Dragons (5e), Pathfinder
Puzzles - Jigsaw and Hanayama
Valid California Driver License REAL ID, Class C, Class M1
CSR, Senior Technician
QA Tester, Software Engineer
Computing Specialist, Senior Computing Specialist
Networking Specialist
Server Administrator, Systems Administrator
Security Analyst, Security Manager, Information Security, Cyber Security
Cyber Security Engineer, Cyber Security Integration and Automation Engineer
Principal Malware Research Engineer
Technical Writer
Security Consultant
Penetration Tester
Malware Researcher
Reverse Engineer