From:                              route@monster.com

Sent:                               Friday, November 4, 2016 8:52 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: PaloAlto

 

This resume has been forwarded to you at the request of Monster User xapeix03

Victor Maseda 

Last updated:  05/11/15

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Alexandria, VA  22312
US

masedav@gmail.com
Contact Preference:  Email

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Victor Maseda - Sr. Security Engineer, Malware Analyst, IDS Analyst, Forensics

Resume Value: 78ck27swr3zcs5i8   

  

 


Victor Maseda     Cyber Security

Page 1

 

ü    Malware Analysis

ü    Forensic Review

ü    Memory Analysis

ü    Intrusion Detection Analysis

ü    GIAC Intrusion Detection Analyst

ü    Information Security

ü    Agency Liaison

ü    Leadership

ü    Cryptography

ü    Wireless Network Security

ü    E-Commerce Security

ü    Security Compliance Reviews

ü    Operating System Configuration

ü    Decision Making

ü    Policy Development

ü    IT Infrastructure

ü    Enterprise Perimeter Assessment

ü    Systems Analysis

ü    Troubleshooting

ü    Communication

ü    Customer Service

ü    Problem Solving

ü    Attention to Detail

ü    Vulnerability Assessment

ü    SIPRNet

ü    Risk Assessment

ü    Intrusion Detection

ü    Security Engineering

ü    Develop Deployment Plans to optimize operation mode of Malware technology

ü    Sensor Configuration, Deployment and Fine-Tuning

 

 


Victor Maseda     Cyber Security

Page 1

 

 


Victor Maseda     Cyber Security

Page 1

 

 

Education

 

Master of Science Program, Graduate Specialization in Computer Security and Information Assurance. George Washington University. November 2002.

 

Bachelor of Science degree in Computer Networking.

Strayer University. Magna Cum Laude. May 2000.

 

Bachelor of Science Degree in Mechanical Engineering.

Old Dominion University. GPA 4.0. Transferred, December 1998.

 

Associate of Science Degree in Science.

Northern Virginia Community College. Cum Laude. May 1997.

Work Experience

 

Senior Cyber Security Consultant Representative, Momentous LLC

March 2015 – Present

          Coordinating Consulting Services and Support.

 

Senior Security Consultant, Apex Systems

December 2014–February 2015

          Selected to support DHS contracts

 

Some Control(s)/Tool(s):

Fire-Eye, enCASE/CyberSecurity, Memory Analysis, Malware Analysis, ArcSight, NetWitness, SecurityCenter/Tenable

 

SOC Senior Security Engineer / Security Analysis, Cyberdata

September 2014–November 2014

          Responsible for reviewing malware infections and taking pertinent Incident Response (IR) Actions to mitigate Security Incidents

          Performed Cyber Forensics services in support to SOC requirements/Mission

          Provided recommendations to enhance Enterprise Infrastructure Security Posture

 

Some Control(s)/Tool(s):

Fire-Eye, enCASE/CyberSecurity, Memory Analysis, SIFT, Symantec Enterprise, ArcSight, NetWitness, TippingPoint, SecurityCenter/Tenable

 

SOC Lead / Senior Security Engineer, Lunarline

December 2013–April2014

          Led Bureau of Industry and Security SOC and provided oversight to Security analyst

          Reviewed SOC Controls and supported Application License management requirements

          Performed Discovery and Enumeration scans in support of Enterprise Monitoring

          Recommended Critical Security Control(s) to optimize BIS Enterprise Security Posture

 

Some Control(s)/Tool(s):

Lancope StealthWatch, SolarWinds LEM, McAfee ePO, SecurityCenter Tenable

 

SOC Senior Security Engineer, CACI

June 2012–June 2013

          Designed the International Trade Administration (ITA’s) New Generation Network (NGN) Amazon Web Services (AWS) Cloud Security Architecture  - Designed Approved by CISO

          Performed review of Critical Security Control(s) and provided recommendations for Enterprise Integration

          Supported Deployment/Integration/Operations of Data Loss Prevention (DLP) Controls

          Assessed Intrusion Detection Policies and performed review of intrusion events

          Performed Memory review of Information Systems

 

Some Control(s)/Tool(s):

HBGary Active Defense, enCase (standalone), Sourcefire, Websense, Splunk

 

 

 

SOC Cyber Forensics Lead, TMR

December 2010–March 2012

          Security Operations member responsible for responding to/handling Cyber Security Incidents

          Forensics Lead responsible for review of Information Systems involved in Cyber Security Incidents

          Review artifacts traversing Enterprise for malicious content, malware analysis

          Performed computer forensics and technical analysis of compromised systems

          Performed computer forensics including detailed technical analysis of media such as Hard Drives, USB Drives and similar media of compromised systems

          Drafted Fire-Eye Malware Intelligence Architecture Deployment Strategy

          Developed Deployment Plans to enhance Enterprise Malware Defense Technology

          Integrated and configured Intrusion Detection Sensors

          Provided recommendations to enhance Enterprise Security requirements

          Supported day-to-day IR/Security Operations

 

Some Control(s)/Tool(s):

enCASE, Fire-Eye, McAfee ePo, ArcSight, ollydbg, IDA pro, Manual Correlation Analysis, Web Application Firewall/Trustwave, Netwitness, SourceFire, PaloAlto

 

SOC Security Analyst, Syracuse Research Corporation

July 2009–November 2010

          U.S. Immigration and Customs Enforcement Security Operations Center Member, Tier3

          Provided Risk Assessment Reviews of Enterprise Change Requests (CRs)

          Made Recommendations to the Chief Information Security Officer (CISO) to reduce Security Impact caused by CRs

          Developed Enterprise Level IDS Trend Reports to Augment Monitoring Capabilities

          Supported DHS Security Event Notification (SEN) Process

          Performed Malware Analysis and Forensic Reviews of Network Assets identified in Cyber Security Incidents

          Analyzed malicious code in support of incident analysis and response

          Performed dynamic and in depth static analysis and reverse engineering of identified malware

          Performed malware analysis on files of interest and suspected new instantiation of malicious code

          Responsible for forensic examinations to include; static and dynamic malware analysis

          Performed computer forensics and technical analysis of compromised systems

 

Some Control(s)/Tool(s):

enCASE Enterprise, HBGary, VMWare, Open Source, McAfee ePO, ISS RealSecure, Intel Analysis / Manual Correlation Analysis

 

SOC Senior Security Analyst / Liaison, SRA International.

September 2008–June 2009

          Department of State (DoS) Computer Incident Response Member.

          Analyzed network traffic to detect anomalies indicative of intrusions to the DoS Enterprise.

          Enhanced CIRT monitoring capabilities.

          Coordinated security efforts between the Computer Incident Response Team and other Bureaus to protect the DoS Enterprise against pertinent threats, key team member who facilitates effective communication among stakeholders.

          Prepared and presented daily cyber security briefings on the status of security events and incidents, demonstrated a keen ability to communicate to a broad range of audiences at all levels of the organization on complex topics.

 

Some Control(s)/Tool(s):

ISS RealSecure, Network Monitor, Intel Review

NOTE: Additional Work Experience available upon request.

 

Certifications

 

National Security Agency (NSA) / Committee of National Security Systems Certification (CNSS)

Computer Hacking Forensic Investigator (CHFI), pursuing

Global Incident Analysis Center (GIAC) Certified Intrusion Detection Analyst (Gold)

Internet Security Systems, Certified Product Specialist

Internet Security Systems, Certified RealSecure User

Transmission Control Protocol/Internet Protocol (TCP/IP) Certified

Microsoft Certified Professional (MCP)

 

Honors / Awards

 

*National Honors Society, Member

*President’s Excellence Award, Northrop Grumman

*Team Performance Award, Computer Sciences Corporation

*Client’s ‘Note of Satisfaction’ received for support rendered, Science Applications International

Corporation

*Certificate of Appreciation for Outstanding Performance, Booz, Allen & Hamilton

*Selected National Security Team Member for internally-invested Intrusion Detection Systems Capability, Booz, Allen & Hamilton

*Performance Appreciation Award - Certificate of Appreciation, Computer Sciences Corporation

 

Selected Training

 

Reverse Engineering Malware, GREM

System Memory Forensics / Threat Analysis

Computer Hacking Forensic Investigation

Network and Computer Hacker Exploits

Computer Security Incident Handling

Advanced Packet Filtering and Intrusion Detection

IDS Analysis, Fine-Tuning, and Signature Development

Firewall Technology CCSE/CSA

Advanced Perimeter and Defense in Depth

Advance Perimeter Defense
Other training provided upon request

Victor Maseda     Cyber Security

Page 1

 

 

Victor Maseda

masedav@gmail.com

Top Secret (TS)

 

Qualifications Summary

 

          Over 15 years of experience in Cyber Security Consulting

          Experienced in Strategizing Defense Measures to protect Automated Information Systems against Cyber Security Threats

          Expert in Information Systems Memory Analysis and Forensic Review

          Proficient in Reverse Engineering Malware

          Skilled in identifying rogue Information Systems' Behaviors indicative of compromised Enterprise Assets, Behavior Analysis

          Expert Instruction Detection Systems Engineer/Architect

          Experienced in issuing Security Warnings and Alerts to raise Enterprise Security Awareness 

          Proficient in identifying rogue traffic flows indicative of Unauthorized Access, misconfigured and/or compromised Information Systems

          Skilled in developing Security Policies and Procedures to enforce and maintain efficient Enterprise Security Measures

          Keen ability to review Security Compliance and effectiveness of Enterprise Information Security requirements resulting from Audits and Inspections

          Security Liaison to U.S. Federal Departments, Embassies, and Bureaus

          Competent in installing and configuring various Operating Systems, including: Linux and Windows clients and servers

 

Competencies

 



Experience

BACK TO TOP

 

Job Title

Company

Experience

Sr. Security Engineer, Malware Analyst, IDS Analyst, Forensics

Federal Contractor

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Years of relevant work experience:

10+ to 15 Years

Date of Availability:

Within 2 weeks

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Top Secret

US Military Service:

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Sr. Security Engineer, Malware Analyst, IDS Analyst, Forensics

 

Target Company:

Company Size:

Occupation:

Security/Protective Services

·         Security Intelligence & Analysis

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-VA-Alexandria

Relocate:

No

Willingness to travel:

Up to 25% travel

 

Languages:

Languages

Proficiency Level

English

Fluent

Spanish

Advanced