Victor Maseda Cyber
Security
Master
of Science Program, Graduate Specialization in Computer Security and
Information Assurance. George Washington University.
November 2002.
Bachelor
of Science degree in Computer Networking.
Strayer
University.
Magna Cum Laude. May 2000.
Bachelor
of Science Degree in Mechanical Engineering.
Old
Dominion University.
GPA 4.0. Transferred, December 1998.
Associate
of Science Degree in Science.
Northern
Virginia Community College. Cum Laude. May 1997.
Senior Cyber
Security Consultant Representative, Momentous LLC
March 2015 –
Present
▪
Coordinating
Consulting Services and Support.
Senior
Security Consultant, Apex Systems
December
2014–February 2015
▪
Selected
to support DHS contracts
Some Control(s)/Tool(s):
Fire-Eye, enCASE/CyberSecurity, Memory
Analysis, Malware Analysis, ArcSight, NetWitness, SecurityCenter/Tenable
SOC Senior
Security Engineer / Security Analysis, Cyberdata
September
2014–November 2014
▪
Responsible
for reviewing malware infections and taking pertinent Incident Response (IR)
Actions to mitigate Security Incidents
▪
Performed
Cyber Forensics services in support to SOC requirements/Mission
▪
Provided
recommendations to enhance Enterprise Infrastructure Security Posture
Some Control(s)/Tool(s):
Fire-Eye, enCASE/CyberSecurity, Memory
Analysis, SIFT, Symantec Enterprise, ArcSight, NetWitness, TippingPoint,
SecurityCenter/Tenable
SOC Lead /
Senior Security Engineer, Lunarline
December
2013–April2014
▪
Led
Bureau of Industry and Security SOC and provided oversight to Security
analyst
▪
Reviewed
SOC Controls and supported Application License management requirements
▪
Performed
Discovery and Enumeration scans in support of Enterprise Monitoring
▪
Recommended
Critical Security Control(s) to optimize BIS Enterprise Security Posture
Some Control(s)/Tool(s):
Lancope StealthWatch, SolarWinds LEM,
McAfee ePO, SecurityCenter Tenable
SOC Senior
Security Engineer, CACI
June 2012–June 2013
▪
Designed
the International Trade Administration (ITA’s) New Generation Network (NGN)
Amazon Web Services (AWS) Cloud Security Architecture - Designed
Approved by CISO
▪
Performed
review of Critical Security Control(s) and provided recommendations for
Enterprise Integration
▪
Supported
Deployment/Integration/Operations of Data Loss Prevention (DLP) Controls
▪
Assessed
Intrusion Detection Policies and performed review of intrusion events
▪
Performed
Memory review of Information Systems
Some Control(s)/Tool(s):
HBGary Active Defense, enCase (standalone),
Sourcefire, Websense, Splunk
SOC Cyber
Forensics Lead, TMR
December 2010–March
2012
▪
Security
Operations member responsible for responding to/handling Cyber Security
Incidents
▪
Forensics
Lead responsible for review of Information Systems involved in Cyber Security
Incidents
▪
Review
artifacts traversing Enterprise for malicious content, malware analysis
▪
Performed
computer forensics and technical analysis of compromised systems
▪
Performed
computer forensics including detailed technical analysis of media such as
Hard Drives, USB Drives and similar media of compromised systems
▪
Drafted
Fire-Eye Malware Intelligence Architecture Deployment Strategy
▪
Developed
Deployment Plans to enhance Enterprise Malware Defense Technology
▪
Integrated
and configured Intrusion Detection Sensors
▪
Provided
recommendations to enhance Enterprise Security requirements
▪
Supported
day-to-day IR/Security Operations
Some Control(s)/Tool(s):
enCASE, Fire-Eye, McAfee ePo, ArcSight,
ollydbg, IDA pro, Manual Correlation Analysis, Web Application
Firewall/Trustwave, Netwitness, SourceFire, PaloAlto
SOC Security
Analyst, Syracuse Research Corporation
July 2009–November
2010
▪
U.S.
Immigration and Customs Enforcement Security Operations Center Member, Tier3
▪
Provided
Risk Assessment Reviews of Enterprise Change Requests (CRs)
▪
Made
Recommendations to the Chief Information Security Officer (CISO) to reduce
Security Impact caused by CRs
▪
Developed
Enterprise Level IDS Trend Reports to Augment Monitoring Capabilities
▪
Supported
DHS Security Event Notification (SEN) Process
▪
Performed
Malware Analysis and Forensic Reviews of Network Assets identified in Cyber
Security Incidents
▪
Analyzed
malicious code in support of incident analysis and response
▪
Performed
dynamic and in depth static analysis and reverse engineering of identified
malware
▪
Performed
malware analysis on files of interest and suspected new instantiation of
malicious code
▪
Responsible
for forensic examinations to include; static and dynamic malware analysis
▪
Performed
computer forensics and technical analysis of compromised systems
Some Control(s)/Tool(s):
enCASE Enterprise, HBGary, VMWare, Open
Source, McAfee ePO, ISS RealSecure, Intel Analysis / Manual Correlation
Analysis
SOC Senior
Security Analyst / Liaison, SRA International.
September 2008–June
2009
▪
Department
of State (DoS) Computer Incident Response Member.
▪
Analyzed
network traffic to detect anomalies indicative of intrusions to the DoS
Enterprise.
▪
Enhanced
CIRT monitoring capabilities.
▪
Coordinated
security efforts between the Computer Incident Response Team and other
Bureaus to protect the DoS Enterprise against pertinent threats, key team
member who facilitates effective communication among stakeholders.
▪
Prepared
and presented daily cyber security briefings on the status of security events
and incidents, demonstrated a keen ability to communicate to a broad range of
audiences at all levels of the organization on complex topics.
Some Control(s)/Tool(s):
ISS RealSecure, Network Monitor, Intel
Review
NOTE: Additional Work Experience available
upon request.
National Security Agency (NSA) / Committee
of National Security Systems Certification (CNSS)
Computer Hacking Forensic Investigator
(CHFI), pursuing
Global Incident Analysis Center (GIAC)
Certified Intrusion Detection Analyst (Gold)
Internet Security Systems, Certified
Product Specialist
Internet Security Systems, Certified
RealSecure User
Transmission Control Protocol/Internet
Protocol (TCP/IP) Certified
Microsoft Certified Professional (MCP)
*National Honors Society, Member
*President’s Excellence Award, Northrop
Grumman
*Team Performance Award, Computer Sciences
Corporation
*Client’s ‘Note of Satisfaction’ received
for support rendered, Science Applications International
Corporation
*Certificate of Appreciation for
Outstanding Performance, Booz, Allen & Hamilton
*Selected National Security Team Member for
internally-invested Intrusion Detection Systems Capability, Booz, Allen &
Hamilton
*Performance Appreciation Award -
Certificate of Appreciation, Computer Sciences Corporation
Reverse Engineering Malware, GREM
System Memory Forensics / Threat Analysis
Computer Hacking Forensic Investigation
Network and Computer Hacker Exploits
Computer Security Incident Handling
Advanced Packet Filtering and Intrusion
Detection
IDS Analysis, Fine-Tuning, and Signature
Development
Firewall Technology CCSE/CSA
Advanced Perimeter and Defense in Depth
Advance Perimeter Defense
Other
training provided upon request