Security god with big 5 exp needs work

From: lostlight.net (lostlightat_private)
Date: Mon Mar 17 2003 - 12:18:27 PST

  • Next message: Paul Ridge: "IT Security Strategist x 5 (Europe)"

                              Dominique S Davis
                              CSO/Security architect
    
                              415 681 4216
                              Email:mrmojoat_private
                              Email:mrmojoat_private
                              Email:lostlightat_private
    
    
    Objectives
    My goals are a permanent position with a company where I can put my existing
    
    skills to use as well as acquire new ones. I also desire position where i
    can
    
    design and implement company wide security measures and build an effective
    
    security team  .
    
    Accomplishments/Media
    I was the first person to break the encryption on Microsoft's NetBEUI Shared
    
    folders and network resources for Windows 95/98.
    Speaker at defcon 7 on windows security and windows networking as (Mrmojo).
    Speaker at defcon 8 on windows 2000 security.
    Numerous white papers on windows security.
    Numerous windows Security programs http://www.dis.org/mrmojo
    I am quoted in the following:
    CNN online http://cnn.com/TECH/computing/9907/12/hair.idg/index.html
    WTVN radio show john Corby show speech on windows networking and security.
    Wired Magazine
    PC world weekly
    USA today Front-page of life section /article on windows security after
    
    defcon 7.
    LA Times front page of business section defcon 6.
    A&E Interview on cyber terrorism and computer crime (to air JAN to FEB 2000)
    
    SKILLS:
    Operating Systems:
    
    MSDOS
    Windows 3.11 (windows for workgroups)
    Windows 95,Windows 98 (se) Windows CE
    Windows NT (server and workstation) (3.5,4.0)
    Windows 2000 /XP
    FreeBSD, Net BSD, OpenBSD
    Slackware, Redhat, Suse, Trinux, Mandrake
    
    Networking skills
    Ability to configure, administer, audit, secure and penetrate the following:
    
    Networks:
    Windows 3.11, Windows 95/98, Windows NT, Windows 2000
    
    Network Applications:
    Internet Information Server/Visual Source Safe/SQL Server/MS Site server/MS
    
    Exchange/MS BackOffice/Web trends Server/Samba/Apache Web Server/Wingate/Win
    
    proxy/Codesafe/MS Personal Web Server/MS Virtual Private Networking/LOTUS
    
    Mail Server/
    
    Firewalls
    Firewall 1 (NT) + Nokia Versions/CISCO PIX/Netscreen/Raptor/Netgear
    
    Network Protocols:
     Vpn/ TCP/IP/ NetBEUI/ NETBIOS/ IPX/SPX/ SNMP/ SMTP/ SSH/ SHTTP/ HTTP/
    
    TELNET/ FTP/GOPHER/
     SSL/ IPSEC/ SMB/PKI
    
    Intrusion detection /Prevention systems
    Tripwire
    Viperdb
    Etercept
    Nfr
    Hummingbird NT
    Mantrap
    Custom IDS*
    
    Security Skills
    Ability to train and  manage others as well as working well alone
    In-depth knowledge of security audits as well as how to write and implement
    
    policy
    Ability to conduct legal and policy audits
    Ability to design and implement company wide security measures including but
    
    not limited to:
    Site audits
    Security audits
    Physical security measures i.e. Biometrics and theft prevention
    Intrusion detection and prevention measures
    Data backup encryption security and redundancy measures
    Firewalls
    Encryption and Vpn solutions
    Security training and presentations for employees
    Preparing security presentations for potential partners as well as third
    
    party auditors
    Design and implementing document and software change control
    Ability to audit and evaluate new security technologies (hardware/software)
    
    Misc skills
    In-depth knowledge of the Windows 95/98/NT/2000/XP registries
    Understanding of PC hardware installation, repair, and upgrade
    Level 3 technical support skills, in person and over the telephone
    Understanding of PC software installation, repair, upgrade, and disaster
    
    recovery
    Ability to program in Visual Basic, HTML, and VRML, JavaScript,
    Working knowledge of shell commands and shell scripts
    Working knowledge of  Xwindows, SSH, telnet, text only web browsers
    
    Professional Experience:
    
    Microsoft
    WebTV Security Architect
    Mountain View, CA
    Jan 2001  - Jan 2002
    Responsibilities Included:
    
    
    Application Level Security Testing
    24 hour on call incident response
    Intruder tracking and prosecution
    Attacker profiling
    Corporate counter espionage
                  Authoring and implementing the following policies:
     Network Security Policy
     EIRP (Emergency Incident Response Procedure)
     Security Document change control policy (for security documents)
     Employee Termination Policy
                   Service level Security policy
                   Further duties include
                   Management of the 911 security breach
                   Electronic   Infiltration of hostile groups
                   24 hour on call incident response
     Writing training documentation for Sales staff, and train Sales and Support
    
    on 'demo exploits'  and  functionality and security of the web tv service
                   Service and software side bug resolution and tracking
                   Reverse engineering software
    
    
    
    
    
    
    
    
    
    
    Entercept
    Senior windows researcher
    Sanjose ,CA
    July 2001 - October 2001
    
    Responsibilities Included:
    
    Manage windows team and delegate tasks
    Train windows team and bring them up to date on new issues
    Research, test, and document security issues and vulnerabilities for Windows
    
    NT,2000,IIS
    Write attack signatures for Entercept's host-based IDS
    Test product signatures and write testing plans for QA to provide effective
    
    testing of HTTP engine functionality
    Write training documentation for Sales staff, and train Sales and Support on
    
    'demo exploits' and functionality of the HTTP engines
    Monitor over conventional and underground sources daily for new information.
    Provide Escalation Support for Tech Support cases.
    Work with QA and Development to isolate and correct product bugs, and to
    
    document current and needed functionality.
    Build, manage, and maintain eKAT Windows Lab.
    Provide emergency product response for new issues i.e. code red ,code blue,
    
    and nimda
    
    Wells Fargo
    Intrusion detection /venerability  analysis team
    201 3rd street San Francisco,CA
    January 2001-July 2001
    
    Responsibilities Included:
    
    Blind/internal/application level penetration testing
    Security audits
    24 hour on call incident response
    Intruder tracking and prosecution
    Attacker profiling
    Building and managing a live lab for training and war games
    Building and securing a secure communications system including
    
    bbs,ftp,webserver,emailserver,key exchange server
    Authoring security programs for use in penetration testing and security
    
    audits
    Training other team members in penetration testing as well as writing policy
    Attending training sessions such as black hat and Nfr`s Ncode training
    Authoring and implementing the following polices
    Intrusion response procedure
    EIRP (emergency Incident response procedure)
    Pager rotation teams and IDS/firewall response procedure
    
    Real names Corporation
    Redwood City, CA
    Chief Security Architect/CSO
    March 2000 - August 2000
    
    Responsibilities Included:
    
    Developing Security patches and legal notices for all network computers
    Periodic Security scans and reports of security status
    Inspecting Network Topology for weaknesses
    Implementing changes to existing networks for a more secure environment
    Researching new security issues and exploits and providing reports and
    
    workarounds.
    Installing and configuring web servers for maximum security.
    
    Managing Security Department
    Training additional security personnel
    Authoring and implementing the following policies:
     Network Security Policy
     EIRP (Emergency Incident Response Procedure)
     Backup and restore policy
     Acceptable network use policy
     Security Document change control policy (for security documents)
     Prosecution and Tracking Policy
     Employee Termination Policy
    
    Network Penetration testing
    Physical Penetration testing
    Network security auditing
    Intruder tracking and prosecution
    Preparing documentation and presentations to successfully pass third party
    
    security audits
    Designing and deploying a network wide anti-viral defense topology
    Managing and deploying/monitoring Nokia Firewalls
    Installation and monitoring IDS software
    IDS, Firewall,
    Writing and applying registry armor/OS hardening
    Designing and implementing secure standards and methods for telecommuting
    
    users and remote co-locations
    Quality Assurance testing of third party security applications as well as
    
    providing solutions for remote networking and management
    Responsible for assisting Human Resources in adjusting the corporate culture
    
    to a security-centric model
    
    
    
    Biztro
    Santa Clara, CA
    Independent Security Architect/Consultant
    October 1999 - November 1999
    
    Responsibilities Included:
    Penetration testing
    Security auditing
    Training Personal in use of security software and secure networking
    
    practices.
    Writing A security policy to pass Third party inspection (Price &
    Waterhouse)
    Analyzing Pix Firewall configuration
    Securing the Following apps and servers On A Multi Network
    Internet Information Server, Visual source safe, SQL server, Ms Site server,
    
    Ms Exchange, MS BackOffice, Web trends Server, Ms Virtual Private
    Networking,
    
    Shttp server
    Developing Security patches and legal notices for all network computers
    Periodic Security scans and reports of security status
    Inspecting Network Topology for weaknesses
    Implementing changes to existing networks for a more secure environment
    Researching new security issues and exploits and providing reports and
    
    workarounds.
    Installing and configuring web servers for maximum security.
    
    Crimson Dragon
    Long Beach, CA
    Independent Consultant
    June 1998-June 1999
    
    Responsibilities Included:
    Penetration testing
    Security auditing
    Hardware and software installation and upgrade of existing software
    Training Personal in use of security software and secure networking
    
    practices.
    Troubleshooting and repair of existing system
    Tutoring of users on computer and Internet usage
    Disaster recovery, data restoration, and virus clean-up
    Adding Internet connectivity to the existing system
    Telephone and "hands on" technical support
    Developing Security patches and legal notices for all network computers
    Periodic Security scans and reports of security status
    Inspecting Network Topology for weaknesses
    Implementing changes to existing networks for a more secure environment
    Researching new security issues and exploits and providing reports and
    
    workarounds.
    Installation and configuration of database and inventory software
    Installation and configuration of backup system (removable drives and
    
    uninterruptible power supply)
    Installation and configuration of network workstations
    Establishing an Internet presence for the company
    
    Interplay Productions
    Irvine, CA
    Level 3 Support Technician,
    December 1997-June 1998
    
    Responsibilities Included:
    Providing superior level 3 technical support both over the phone and email
    Solving hardware and software compatibility problems
    Beta-testing software and providing bug analyses
    Updating the tech support database over a network environment
    Designing macros for the email support data base network
    Use of  MS-Office, Lotus, and Excel databases
    
    Tiger Crane Martial Arts Studios
    Signal Hill, CA
    Independent Consultant,
    August 1997-November 1997
    
    Responsibilities Included:
    Hardware and software installation and upgrade of existing software
    Troubleshooting and repairing existing system
    Tutoring users on computer and Internet usage
    Disaster recovery, data restoration, and virus clean-up
    Basic administration of existing system and customer database
    Telephone and "hands on" technical support
    



    This archive was generated by hypermail 2b30 : Mon Mar 17 2003 - 13:42:13 PST