SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Brian Starr
7914 Kedvale Ave
Skokie, Illinois 60076
Brian.Starr@ProtonMail.com
About Me:
I am part of the embedded staff working directly under and funded by the Director of Cybersecurity in Washington
D.C. The Hines location is one of the largest data centers for the Department of Verterans Affairs. I have visited two
other VA data centers for pre-OIG audits. I take great pride in my prior IT experience and working with federal
agencies.
FISMA: (Federal Information Security Act)
I have worked on FISMA compliance mostly in the special publication 800-53r4. I am leading the DISA STIG’s
implementation at the Department of Veterans Affairs. I work alongside the Windows Domain Controller Team
providing technical security guidance along with associated ancillary member servers/management software. I have
prepared a delta spreadsheet of the changes that need to be applied to become compliant with the VA-6500
Handbook and have created a report using Nessus to correct any non-compliant settings based on USGCB or the
DISA STIG controls. I understand the current applications in the environment along with networking devices that
might be affected by implementing more stringent security controls to eliminate vulnerabilities and become
compliant with federal standards.
Cyber-Security and Compliance:
This is a broad term encompassing all aspects of devices and a defense in depth approach. Many controls and
specialized software can be used to monitor behavior. It's important to establish a baseline and then tune the
controls as needed. Customized alerts can be generated or dynamic protection can be used to isolate or disconnect
connections. Event logging for forensic purposes is critical to trace the breach should one occur.
Network Security:
I have worked with Checkpoint firewalls, UTMs and some ASA devices in the past. I've also programmed Cisco
switches for virtual local area network (VLAN’s) and access control lists (ACL). I understand and have implemented
simple network monitoring protocol (SNMP) in my home lab via Splunk. I have an understanding of security controls
related to various endpoints.
Intrusion Detection Systems (IDS):
My expertise with IDS is mostly on Checkpoint. I like to think of anti-virus management servers as another method
for a multi-layer approach to SPAM, virus, endpoint ransomware detection using the McAfee ePolicy Orchestrator
console.
Event and Incident:
I currently report any security incidents with my managers, the local security officer, and the network operations
security team. On occasion I have asked for guidance from the VA Cybersecurity secretary directly. On many
occasions I have been instructed by either the information security officer (ISO) or privacy officer to work with the
system administrator to remediate the potential vulnerability or misconfigured server to become compliant.
Monitoring Systems (SIEM):
I have worked and programmed Solar Winds as a “SIEM” in the past at Cardinal Intellectual Property.
Active Directory:
I have over 20 years of experience. Most of my consulting experience has been done with Active Directory Users
and Computers, Group Policy Security Settings to be compliant with USGCB or DISA STIG. I am currently working on
the system security plan (SSP) for Active Directory (AD) at the VA. I have provided security guidance for Exchange
2010 as the VA has moved their email infrastructure to the Microsoft Cloud servers.

Mais conteúdo relacionado

Mais procurados

New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howlandnado-web
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_ggAlienVault
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmAlienVault
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM AlienVault
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmAlienVault
 
Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Joseph Iannelli
 
Infosec resume-duckworth
Infosec resume-duckworthInfosec resume-duckworth
Infosec resume-duckworthTim Duckworth
 
How Malware Works
How Malware WorksHow Malware Works
How Malware WorksAlienVault
 
Tripwire.ppt
Tripwire.pptTripwire.ppt
Tripwire.pptishaque k
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides finalAlienVault
 
Improve Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMImprove Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMAlienVault
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityDavid Zaizar
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
Taking the Pain out of PCI Compliance
Taking the Pain out of PCI ComplianceTaking the Pain out of PCI Compliance
Taking the Pain out of PCI ComplianceTripwire
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for BusinessElastica Inc.
 

Mais procurados (20)

New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015
 
Infosec resume-duckworth
Infosec resume-duckworthInfosec resume-duckworth
Infosec resume-duckworth
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Tripwire.ppt
Tripwire.pptTripwire.ppt
Tripwire.ppt
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
Improve Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMImprove Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USM
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
Database security
Database security Database security
Database security
 
Taking the Pain out of PCI Compliance
Taking the Pain out of PCI ComplianceTaking the Pain out of PCI Compliance
Taking the Pain out of PCI Compliance
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
 

Semelhante a Brian Starr Cover Letter

Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxwrite4
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxwrite4
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxwrite31
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comPrescottLunt384
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsSolarWinds
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsMichele Chubirka
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecuritySplunk
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecurityShannon Cuthbertson
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer OverviewScott Suhy
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
ISE 510 Final Project Scenario Background Limetree In.docx
ISE 510 Final Project Scenario  Background Limetree In.docxISE 510 Final Project Scenario  Background Limetree In.docx
ISE 510 Final Project Scenario Background Limetree In.docxchristiandean12115
 
Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2Mike Miller
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Studyjoepanora
 

Semelhante a Brian Starr Cover Letter (20)

Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docxANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
resume IT security
resume IT securityresume IT security
resume IT security
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
ISE 510 Final Project Scenario Background Limetree In.docx
ISE 510 Final Project Scenario  Background Limetree In.docxISE 510 Final Project Scenario  Background Limetree In.docx
ISE 510 Final Project Scenario Background Limetree In.docx
 
Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Study
 

Brian Starr Cover Letter

  • 1. Brian Starr 7914 Kedvale Ave Skokie, Illinois 60076 Brian.Starr@ProtonMail.com About Me: I am part of the embedded staff working directly under and funded by the Director of Cybersecurity in Washington D.C. The Hines location is one of the largest data centers for the Department of Verterans Affairs. I have visited two other VA data centers for pre-OIG audits. I take great pride in my prior IT experience and working with federal agencies. FISMA: (Federal Information Security Act) I have worked on FISMA compliance mostly in the special publication 800-53r4. I am leading the DISA STIG’s implementation at the Department of Veterans Affairs. I work alongside the Windows Domain Controller Team providing technical security guidance along with associated ancillary member servers/management software. I have prepared a delta spreadsheet of the changes that need to be applied to become compliant with the VA-6500 Handbook and have created a report using Nessus to correct any non-compliant settings based on USGCB or the DISA STIG controls. I understand the current applications in the environment along with networking devices that might be affected by implementing more stringent security controls to eliminate vulnerabilities and become compliant with federal standards. Cyber-Security and Compliance: This is a broad term encompassing all aspects of devices and a defense in depth approach. Many controls and specialized software can be used to monitor behavior. It's important to establish a baseline and then tune the controls as needed. Customized alerts can be generated or dynamic protection can be used to isolate or disconnect connections. Event logging for forensic purposes is critical to trace the breach should one occur. Network Security: I have worked with Checkpoint firewalls, UTMs and some ASA devices in the past. I've also programmed Cisco switches for virtual local area network (VLAN’s) and access control lists (ACL). I understand and have implemented simple network monitoring protocol (SNMP) in my home lab via Splunk. I have an understanding of security controls related to various endpoints. Intrusion Detection Systems (IDS): My expertise with IDS is mostly on Checkpoint. I like to think of anti-virus management servers as another method for a multi-layer approach to SPAM, virus, endpoint ransomware detection using the McAfee ePolicy Orchestrator console. Event and Incident: I currently report any security incidents with my managers, the local security officer, and the network operations security team. On occasion I have asked for guidance from the VA Cybersecurity secretary directly. On many occasions I have been instructed by either the information security officer (ISO) or privacy officer to work with the system administrator to remediate the potential vulnerability or misconfigured server to become compliant. Monitoring Systems (SIEM): I have worked and programmed Solar Winds as a “SIEM” in the past at Cardinal Intellectual Property. Active Directory: I have over 20 years of experience. Most of my consulting experience has been done with Active Directory Users and Computers, Group Policy Security Settings to be compliant with USGCB or DISA STIG. I am currently working on the system security plan (SSP) for Active Directory (AD) at the VA. I have provided security guidance for Exchange 2010 as the VA has moved their email infrastructure to the Microsoft Cloud servers.