From:                              route@monster.com

Sent:                               Friday, November 4, 2016 8:52 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: PaloAlto

 

This resume has been forwarded to you at the request of Monster User xapeix03

Confidential Resume

Last updated:  03/11/15

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received

Confidential Resume

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Hamid Tora - Principal Security Engineer

Resume Value: e8e5fwrxupr5qxsh   

  

 

Hamidullah S. Tora, AbD
SCSA, CCSA, MCP, A+, Security+
44353 Babbling Brook Terrace #307 ♦ Ashburn, VA 20147
Email: hstora@gmail.com ♦ Phone: (571) 527-7859
Work Authorization: U.S. Citizen
Objective
Acquire a challenging and rewarding position to provide efficient and cost-effective solutions to complex
problems for an organization with respect to their Information Technology, Information Security, Incident
Response, Risk Management, Software Development, and Cloud Computing requirements while continually
utilizing my talents to grow and mentor fellow colleagues.
Professional Experience
Neustar Inc – Neustar Cyber Incident Response Team
Principal Security Engineer, (Sterling, VA)
Sr. Security Engineer, (Sterling, VA)
01/2015 – Present
06/2012 – 12/2014
• Senior Security Engineer for Neustar Cyber Incident Response Team (NeuCIRT), responsibilities include
maintaining corporate security and responding to incidents by identifying and validating events,
coordinating resources for response, mitigating and containing incidents, and analyzing existing and
emerging threats that may pose a risk towards the organization.
• Perform active monitoring of events, intrusion detection, incident response, digital forensics, e-discovery,
malware analysis, malware reverse engineering, vulnerability assessments, risk assessment, penetration
testing, tools integration and automation, and development of security software and systems.
• Actively monitor and respond to incidents for all corporate assets including systems, networks,
applications, data services, web applications, end-user hosts, file shares, e-mail gateways, databases, and
print servers across various corporate lines of business including: Carrier Services – NPAC, Number
Administration, International NLP, GSMA Pathfinder, CALEA Legal Compliance, Multimedia
Interconnect; Enterprise Services – Webmetrics, UltraDNS, Ultraviolet, Quova, US Common Shortcodes,
Neustar Intelligent Cloud, multiple DNS TLD services; Data Analytics – Aggregate Knowledge, Neustar
Information Systems (NIS), and Neustar Labs.
• Principal Computer Forensics Engineer assisting Legal Department and HR, responsibilities include
conducting internal investigations and e-discovery collections, generating comprehensive reports, and
providing summary briefings to all appropriate stakeholders.
• Identify and respond to advanced malware, advanced persistent threats (APT), command-and-control
(C&C) communication activity, and zero-day attacks and vulnerabilities.
• Perform comprehensive static and dynamic malware analysis on suspicious binaries, libraries, multimedia
files, archives, and data files (Win32 PE, Win64 PE+, MSI, DLL, COM, BAT, LNK, SCR, JAR, CLASS,
ZIP, ELF, MACH-O, DMG, HTML, JavaScript, VBS, SWF, FL PDF, Java, MS Office, RTF, JPEG,
PNG, GIF, ICO, MP3, WMV, and AVI) in order to better understand, monitor, and prevent threats
against the organization.
• Configure, deploy, and maintain threat detection and prevention systems including FireEye, Fidelis XPS,
SourceFire, Palo Alto, Check Point Endpoint, Malwarebytes Enterprise, DNS/IP Sinkhole, and
Honeypots for the implementation of improved security monitoring, signature and behavioral based
detection, and active prevention of malicious activity to protect Neustar assets.
• Configure, deploy, and maintain digital forensics and e-discovery systems including Encase Enterprise,
Encase E-Discovery and Cyber Security, Symantec Clearwell, FTK, Sleuthkit, SIFT, and Volatility for
efficient and improved forensics analysis of compromised devices and inquiries from Legal and HR
within the Neustar infrastructure.
• Configure, deploy, and maintain Security Information and Event Management (SIEM) systems and
Security Log Management systems including IBM QRadar, ELSA nodes, and OSSEC to ingest, correlate,
index, and normalize all network feeds and system logs.
• Configure, deploy, and maintain Network Forensic (packet capture, netflow, data archiving) and Data
Loss Prevention technologies including Solera Networks, Bluecoat Analytics Platform, and Symantec
DLP for improved network monitoring, security intelligence and analytics, and the prevention of data
exfiltration of sensitive data.
• Interface and work with Audit and Compliance Team to maintain compliance with regulatory compliance
requirements such as PCI, ISO 27001/2, ISO 9001, FISMA, PCI, Legal, CALEA, and Net-Neutrality.
• Perform vulnerability assessment, penetration testing, and fuzz testing of internal and customer facing
systems, networks, devices, COTS and internally developed applications, and databases utilizing various
commercial and open source tools.
• Analyze various threat intelligence feeds to identify emerging threat actors and attack vectors in order to
establish proactive measures to help Neustar, its customers, and its partners to defend their systems and
networks.
• Collaborate with Department of Homeland Security’s US-CERT Cyber Information Sharing and
Collaboration (CISCP) program members on sharing and analysis of intelligence on existing and
emerging cyber threats to US National Critical Infrastructure and Government.
• Collaborate with Forum of Incident Response and Security Teams (FIRST.ORG) to advise and exchange
information with incident response teams around the globe on incident response and cyber threat
intelligence sharing.
• Maintain up-to-date list of open-source intelligence resources, security threat feeds, and progressive
research in computing and cyber security, open vulnerabilities, and security tools for the Cyber Incident
Response Team.
• Document and maintain comprehensive policies, standard operating procedures and knowledge base
entries for Incident Handling, Incident Response, Malware Analysis, Computer Forensics, and proper
usage of vendor products, security technologies, tools, and scripts.
• Mentor and train junior staff engineers on the usage security tools and technologies, policies and
procedures, and general guidance in relation to Incident Response, Malware Analysis, Vulnerability
Assessment, Penetration Testing, Digital Forensics, Software Development and System Administration.
Blue Canopy – DIT Cyber Security
Intrusion Detection/Computer Forensics Analyst, (Arlington, VA)
01/2012 – 06/2012
• Perform intrusion detection, incident response, and computer forensics for the FDIC to investigate
security events while using a variety of leading vendor security appliances including: ArcSight,
Damballa, FireEye, NikSun, PaloAlto, Cisco ASA.
• Actively monitor the entire security infrastructure for the FDIC to detect and respond to the latest security
threats, exploits & vulnerabilities.
• Identify and respond to advanced malware, persistent threats, command-and-control (C&C)
communication activity, and zero-day attacks.
• Perform detailed static and dynamic malware analysis on observed malicious binary and executable files.
• Maintain up-to-date list of open-source intelligence, security feeds, research analysis and security tools
for the Security Operations Center.
• Create and maintain procedures and knowledge base entries for incident handling and response
procedures for received notifications including Symantec DeepSight, US-CERT, FireEye, and Damballa.
• Analyze network payloads, pcaps, and network data in order to perform intrusion tracing.
• Mentor and train junior staff analysts on tools and procedures in relation to incident management within
the monitored environment.
Oracle Inc – Advanced Customer Services (Sun Microsystems)
Tier-2 ACS Engineer, (Reston, VA)
01/2007 – 01/2012
• Deliver post-sales support and solutions to Oracle AM&R internal infrastructure and external Oracle
customer base including resolving both non-technical customer inquiries and technical incidents on a
variety of platforms, applications, and vendor specific technologies including:
Backup (Symantec NetBackup), Hardware (Oracle Exadata X2-2/X2-8, Sun Fire
v20z/v215/X4100/X4140/X4200 M2, Sun SPARC Enterprise T5120/T1540, Sun StorageTek L1400, Sun
StorEdge 2540/6140, Dell PowerEdge 1750/2950), Network (Cisco Catalyst 3548/4948/6509, Cisco IOS
6509, Cisco ASA 5520, Juniper Netscreen 5GT), OS(Solaris, RHEL, Windows), Database (MySQL,
Oracle 11g), Security (Snort, Snoop, TCPDump, Wireshark, Anti-Virus/Anti-Malware, Truecrypt,
HTTPS, SSL).
• Primary point of contact for Oracle customer base, interfacing with customer’s IT Staff, responsible for
resolution of complex technical problems related to installation, recommended maintenance and the
use/repair/workaround of Oracle products.
• Manage all elements of production monitoring environment including internal infrastructure and Oracle
external customer base.
• Respond to incident escalations from Tier-1 Support Analysts, internal Oracle community, and Oracle
external customer requests, fulfill SLA requirements, take appropriate validation and remediation steps to
resolve incidents, escalate and properly hand-off to upper level support groups as necessary.
• Train and mentor Tier-1 Support Analysts isolate and document occurring trends in monitored
environments to enhance processes in relation to incident management.
• Contribute to centralized problem identification and knowledge base entries for known problems and their
resolutions.
• Create, maintain, modify shell/batch scripts for all elements within monitoring infrastructure; Ensure
proper automated execution within OS run-level (crontab, task scheduler).
• Create, maintain, and modify Oracle internal user accounts within both Windows AD and Solaris
NIS/LDAP environments.
• Create, maintain, and modify user shares, home folders and storage quotas for internal Oracle users on
Windows 2003 and Solaris 10 servers for the production-monitoring environment.
• Validate, decipher, and document system errors found in Unix/Linux Syslog messages and Microsoft
Events logs to troubleshoot and resolve complex application related issues.
• Monitor, troubleshoot and resolve all faulty SCSI drive, LUN, RAID, and Solaris Volume Manager
(SVM) incidents; Work with the appropriate vendor to resolve hardware issues.
• Manage storage volumes including mirrors, soft partitions, concatenations and stripes within Solaris
Volume Manager (SVM).
• Monitor, troubleshoot, and resolve all alerts for failed application processes/daemons including Solaris
Service Management Facility (SMF) and Windows services.
• Monitor, troubleshoot, and resolve all alerts for Solaris, Linux and Windows systems that panic or have
become unavailable; Work to ensure all SLA device up-times and stability are met for Oracle customer
base.
• Monitor, troubleshoot, and resolve all issues with NFSv4 and AutoFS shares and drive mounts.
• Provision and decommission Solaris 10 zones and servers; Guarantee the system passes POST without
errors, boots into the appropriate run-level, confirm all respective services and processes are started, all
volumes are detected and file systems mounted.
• Assist Infrastructure Engineers with installing, configuring, and maintaining entire application stack and
all elements of monitoring for Oracle customer base using Sun Automated Service Manager
(SUNWsasm) and Control Tower Appliance Manager (SUNWcta).
• Monitor, troubleshoot, and resolve all failed database jobs found within MS SQL;
• Monitor, troubleshoot, and resolve all events for Oracle 11g RBMS; Document and decipher Oracle
numbered errors and work with DBA to resolve backup and table space issues.
• Monitor, troubleshoot, and resolve all failed backups and restorations within Symantec Netbackup;
Manage weekly vaulting of tapes, ensure health and quantity of tapes within each storage pool.
• Monitor, troubleshoot, and resolve all network connectivity issues for both internal infrastructure and
Oracle customer base using leading vendor equipment (Cisco, Juniper); Ensure all monitored interfaces
and circuits are up, interface and coordinate with telecommunications vendors to resolve damaged lines.
• Execute and review output from Snoop/TCPDump logs when troubleshooting network SNMP trap storms
to tune Oracle monitored customer base.
• Monitor, troubleshoot and assist in the resolution of all security related events from IDS/IPS equipment
for Oracle customer base; Search Snort Signature Database (snortID), confirm validity of IDS events,
determine its impact, and work with Security Engineers to resolve incidents.
George Mason University – DoIT
Senior IRC Lab Assistant, (Fairfax, VA)
04/2003 – 12/2006
• Lead technical support specialist for Faculty/Staff walk-ins, phone support, and e-mail support.
• Provided support and troubleshoot network connectivity issues for Windows and Linux systems.
• Oversaw and trained junior Lab Assistants providing support to Faculty/Staff.
• Provided support for the WebCT online teaching tools.
• Created online guides and teaching-aids for a variety of desktop applications.
• Created websites with online forms using form field validation (using HTML/XML/CSS, ASP,
JavaScript, VB script, CGI-Perl, PDF); Query, Insert, and Retrieve data record-sets in MS-Access
Database with online forms.
ePlus Technology Inc. – Consultant
C/C++ Programmer, (Herndon, VA)
06/2003 – 01/2005
• Provided consulting services for some software applications and projects written in C/C++.
• Design and maintain software application functions written for sales, tax, and inventory purposes using C.
Chantilly Technical Academy
Network Administration, (Chantilly, VA)
09/2000 – 06/2003
• Designed, implemented and supported network infrastructures, including Local Area Networks (LANs)
and Wide Area Networks (WANs).
• Designed, implemented, and enforced Security Policies using NT Trusts, Local Groups, Global Groups,
Shares, Permissions, Registry and Auditing.
• Network Performance monitoring and fine-tuning using NT Performance Monitor.
• Backup and Recovery procedures of Windows NT Servers and Workstations.
• Knowledge using and implementing various protocols and services including: TCP/IP protocol suite,
DNS, WINS, IPX/SPX, NetBEUI, and File and Print Sharing for Windows.
• Built and maintained Active Directory Forests and Trees, Network Domains, and Workgroups.
Technical Proficiency
Software
Operating Systems:
• Intel x86/x64: MS-DOS, IBM-DOS, Windows 95/98, Windows NT/2000/2003/2008/2012, Solaris
2.6/7/8/9/10, Red Hat Enterprise Linux, CentOS, Oracle Enterprise Linux, VMWARE ESX, Gentoo,
Ubuntu, BackTrack, Kali, Remnux
• SPARC: Solaris 2.6, Solaris 7/8/9/10
• PowerPC: IBM AIX 4.2.x
Application Packages:
• Firewalls: IPChains; IPTables; Checkpoint NG VPN-1/Firewall-1; PaloAlto Networks PA Series
• IDS/IPS/MPS/CyberThreat: FireEye MPS, PaloAlto WildFire, Fidelis XPS, Cisco IPS, Damballa,
SourceFire, Snort, TripWire, OSSEC.
• SIEM: ArcSight, QRadar
• Network/Scan/Sniffer: ping, telnet, ssh, ftp, sftp, tracert, whois, nslookup, dig, netstat, netcat, snoop,
tcpdump, Wireshark, CocoaPacketAnalyzer, nmap, xscan
• Vulnerability Assessment/Penetration Testing: Nessus, Nexpose, MetaSploit, BurpSuite, Kali,
BackTrack, Core Impact Professional, Nikto, Qualys, McAfee Secure PCI/DSS, Aircrack, Brutus, Cain
and Abel, John the Ripper, Ophcrack, Medusa, fgdump, L0phtCrack, SolarWinds, Wfuzz
• Logging: Syslog, Syslog-NG, rsyslog, ELSA, Splunk
• Malware Analysis/Reverse Engineering: Remnux, Volatility, Yara, IDA Pro, Ollydbg, LordPE, ImpREC,
PEiD, Process Monitor, Process Explorer, Regshot, INETsim, Cuckoo Sandbox, Jsunpackn, Firebug,
Spidermonkey, V8, Malzilla, FakeDNS, TCPView, HxD Hex Editor, 0xED
• Digital Forensics and eDiscovery: Encase Enterprise/ECC, Symantec Clearwell, FTK, Autospy, Sleuthkit,
SIFT, SSDEEP, dd, dcfldd, Moonsols Memory Toolkit, Memoryze, Belkasoft, WinEn, Lime, fmem,
crash, Goldfish, Mac Memory Reader, OSXPMem, Qemu, Xen Dump-Core
• Network Forensics: Bluecoat, Solera, Niksun, NetWitness, Moloch
• Anti-Virus: Malwarebytes, McAfee, Norton, TrendMicro, AVG, AVAST, Kaspersky, Sophos, ClamAV,
BlackICE.
• Cloud/Hypervisors: Amazon AWS, Google Application Engine, Oracle VirtualBox, VMware
Fusion/Workstation/Server/vCenter/vSphere/ESX
• Development/IDE: Microsoft Visual Studio {Visual C++, Visual Basic}, Microsoft Assembler {MASM},
Eclipse, NetBeans, GCC, GDB, IDA Pro, JFlex, LC3, Berkley Yacc, Lex, IBM Rational Rose, make, vi,
vim, nano, notepad, notepad++, PyCharm, Komodo
• Database: MySQL, Microsoft SQL Server (7.0, 2005, 2008), Oracle 10g/11g, mongoDB
• Web Servers: Apache, TomCat, Microsoft IIS
• Backup/Archiving: Symantec NetBackup, Symantec eVault, HP Data Protector
• Event Monitoring: IBM Tivoli Netcool, Remedy, CA eHealth SysEDGE, SMC DarkStar Monitor.
• Other: Microsoft Office, Apache OpenOffice, Adobe Creative Suite, Citrix, screen, pcAnywhere, Norton
GHOST, Symantec VIP, Cisco AnyConnect
Programming/Scripting
• C/C++ {including Object Oriented Programming and ANSI STLs}
• JAVA
• PERL, PHP, Javascript, VBScript, ASP, HTML, XML, CSS
• x86 Assembly
• Bourne/Bourne Again/Korne shell scripting, DOS Batch scripting
• Windows Powershell
Protocols
TCP/IP, IPX/SPX, ISDN, RIP, OSPF, IGRP, EIGRP, BGP, NetBEUI
Education and Certifications
• George Mason University (Volgenau School of Engineering)
Doctor of Philosophy (Ph.D.), IT – Information Security and Assurance
Masters of Science (M.S.), Information Security and Assurance (3.83 GPA)
Bachelor of Science (B.S.), Computer Science
• Northern VA Community College
High School Diploma
Associates in Science, Computer Science (3.65 GPA /w High Honors)
• James W. Robinson Secondary School
• Chantilly Technology Academy
Information Technology Training with a focus on networking and system administration.
• Certified Information Systems Security Professional (CISSP)
• Certified Ethical Hacker (CEH)
• GIAC Certified Intrusion Analyst (GCIA)
• Sun Certified System Administrator (SCSA)
• Microsoft Certified Professional + Internet (MCP+I)
• Checkpoint Certified Security Administrator (CCSA)
• COMPTIA Certified Security Engineer (Security +)
• COMPTIA Certified Hardware Technician (A+)
• Certified Scum Master (CSM)
Expected 2015
Expected 2015
Expected 2015
Expected 2016
2012
2008
2004
2000
Professional Associations
• Professional Reverse Engineers
• Volatility Users Group
• IEEE Member – Computer Society and Graduate Student
• Volgenau School of Engineering Alumnus
• Cyber Information Sharing and Collaboration Program (CISCP)
• Information Technology Information Sharing and Analysis (IT-ISAC)
• Forum of Incident Response and Security Teams (FIRST)
• US-CERT Users Group
• Dragon News Bytes (DNB) Users Group
Academic Experience
• Malware Reverse Engineering
Experience with disassembling code for potentially malicious binary, or piece of malware, in order to
gain a better understanding of how a binary functions when executed. Experience conducting both static
and dynamic approaches to understanding malware. Static analysis includes comprehensive review of the
program instructions to identify the full functionality of the program using debuggers and disassemblers.
Dynamic analysis includes behavioral aspects as malicious binaries are executed in a controlled
environment to monitor environment changes (file, system, registry, network, process, kernel, etc.),
network communications, and other system interactions.
• Debugging/Disassembling/Reverse Engineering
I have worked extensively with the GNU GDB to debug ANSI C programs, analyze and disassemble the
Unix/Linux binaries to identify potentially insecure code that allows exploits such stack and heap
overflows. I have worked with IDA Pro to dynamically examine Windows executable files and Linux
binaries to debug exploitation of stack and heap memory corruption vulnerabilities.
• Intrusion Detection
Experience in the comprehensive study of the science and art of Intrusion Detection including the basic
principles of misuse detection, anomaly detection, and hybrid detection models. Explored differing
Intrusion Detection systems such as IDES, GrIDS, EMERALS, NetSTAT, Bro, Snort, and SourceFire.
Evaluated Intrusion Detection systems for particular security requirements, examined vulnerabilities and
buffer over flow exploits. Covered topics including intrusion basics, network based attacks, basic security
concepts, host-based intrusion detection, network based intrusion detection, misuse detection, anomaly
detection, intrusion tracing, intrusion responses, and countermeasures against Intrusion Detection.
• Secure Software Design
Experience with the theory and practice of software security and its associated risks including buffer
overflows, race conditions, random number generation, and the identification of potential threats and
vulnerabilities throughout the software development lifecycle. Solid understanding of the methodologies
and tools used to identify and eliminate security vulnerabilities, techniques to prove the absence of
vulnerabilities, and methods to avoid security pitfalls in new software. Proficiency in establishing
guidelines for building secure software from the ground up and integrating risk analysis and management
throughout the software life cycle.
• Security Protocol Analysis
Experience designing, understanding, verifying, and testing communication protocols so they meet their
objectives of recognizing the basic components of a communication protocol; specifying security
properties accurately; modeling actors and mal-actors against which a protocol ought to be secure;
discussing verification and testing methods and their limitations by ensuring that the specified protocol
satisfies stated security objectives in the presence of specified mal-actions; designing a medium-size
protocol that satisfies a specification of requirement; using existing tools to specify and verify security
protocols; and testing protocols for satisfying their security objectives.
• Research in Digital Forensics
Experience conducting comprehensive research with focus on digital forensics including open problems,
counter measures against digital forensics, and fundamental and practical limitations of current digital
forensics techniques.
• Network Security
Experience in comprehensive study of Network Security including basic security concepts, classical
cryptography, secret key cryptography (Block Ciphers, DES, Rijndael Cipher), basic computational
number theory, public key cryptography (DSA, RSA, Diffie-Helman), hash functions, authentication,
cryptanalysis of MD5 and SHA, Kerberos, and TCP/IP.
• Security Audit and Compliance Testing
Experience in the fundamental concepts of the IT-Security audit and control process in the government,
financial industry, and healthcare industry. Created a control structure with goals and objectives, audit a
given IT infrastructure against it, and if found inadequate, establish a systematic remediation procedure.
Guidance for carrying out this procedure provided against expert models primarily ISACA’s COBIT open
standard. Structure and perform Sarbanes-Oxley, HIPAA and FISMA audit programs.
Programming Projects
• Authentication using Casper/FDR
Modeled the Diffie-Helman key exchange and ZRTP protocols using the abstract language of Casper to
produce a more formal language representation in CSP for the purposes of designing, testing, and
evaluating whether these protocols satisfy authentication objectives of weak authentication (aliveness) or
strong authentication in the presence of a malicious agent (intruder).
• Shell Code – Buffer Overflow
Developed Linux shell code in assembly such that it would spawn a /bin/sh shell upon being read into by
the vulnerable application, the vulnerable program contained some misuse detection capability based on
approximate pattern matching. The obfuscated shell code was designed to defeat the approximate
signature matching.
• PVM Compiler
Developed a compiler to generate PVM (Paxi Virtual Machine) byte code. Since PVM machines do not
exist, I wrote a PVM emulator to run programs generated by my compiler. The PVM emulates memory
with two integer arrays, a code store array for instructions and a data store array for data. It has an
instruction pointer IP, which is emulated by an integer variable and a register array (an integer array) of
three registers. There in an instruction set, each instruction being three integers: an op-code and two
arguments.
The compiler was created using a lexical scanner (jflex), symbol table (which would recognize as a
lexeme each of the keywords as defined in the Paxi language definition and return an integer token for
each of these lexemes) and a yacc-based parser (byacc/j), which is built around the grammar in the Paxi
Language Definition. The parser would literally parse through a PAXI program using the defined rules
and generate PVM code and store it into the code store array.
• UUencoder/UUdecoder
Developed an efficient UUencoder/UUdecoder program in C to emulate Unix-to-Unix encoding of ASCII
plaintext into encoded text including compression mechanisms to compensate for added overhead. The
program performs binary to ASCII text encoding for the public submission of files.
Academic/Research Papers
• Hamid Tora, Amin Tora, “Volatile Memory Acquisition and Analysis of Google Glass,” George Mason
University, ISA 785, May 2014
• Hamid Tora, “Improper Neutralization of Meta-characters used in OS Commands (OS Command
Injection)”, ISA 681, March 2013
• Hamid Tora, “Analysis of Zero Access Rootkit”, ISA 764, December 2012.
• Jorge Berris, Nalin Pilapitiya, Hamid Tora “Analysis of Android Malware and Volatile Memory,” George
• Mason University, ISA 673, March 2012.
• Abeer Alhuzali, Hamid Tora, “Static and Dynamic Approaches in Malware Analysis,” George Mason
University, ISA 674, December 2011.
• Hamid Tora, “Critical Review of Auditing Organizations: A Theoretical Concept and Empirical
Evidence,” George Mason University
• Terrell Bush, Paul Dagget, Doug McDevitt, Hamid Tora, “Enhancing Mail Transport Authentication,”
George Mason University, INFS 612, May 2010.
Research Interests
• Malware Analysis and Reverse Engineering
• Acquisition and Analysis of Volatile Memory
• Attack and Defense of Mobile Malware
• Digital Forensics
• Network Security
Personal Profile
• Excellent leadership skills, recognized by supervisors and peers as exceptionally organized and thorough.
• Strong interpersonal and communication skills, with the ability to work efficiently on an individual basis
or in a group setting.
• Ability to learn quickly and adapt to new situations, encompassing new technological and managerial
opportunities.
• Strong work ethics, and highly motivated to continually grow, learn from mistakes and achieve set goals.
References
Shall be provided upon request.



Experience

BACK TO TOP

 

Job Title

Company

Experience

Principal Security Engineer

CONFIDENTIAL

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Years of relevant work experience:

2+ to 5 Years

Date of Availability:

Within one month

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Inactive Clearance

US Military Service:

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Principal Security Engineer

Desired Job Type:

Employee

Desired Status:

Full-Time

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

·         Network and Server Administration

·         Software/System Architecture

 

Target Locations:

Selected Locations:

US-VA-Northern

Relocate:

No

Willingness to travel:

Up to 25% travel

 

Languages:

Languages

Proficiency Level

English

Fluent