Aaron Post

Aaron Post Email and Phone Number

Product Security Engineer @ Terumo Blood and Cell Technologies
Denver, CO, US
Aaron Post's Location
Denver, Colorado, United States, United States
Aaron Post's Contact Details
About Aaron Post

I started my career in the U.S. Navy where I served for 9 years wearing many hats as a Technology Professional. I was then hired by one of the top healthcare facilities in Denver to mature their mission critical security posture which is vital when dealing with patient records and data.I offer extensive experience designing, securing, and protecting enterprise level government and civilian computer networks. I have been recognized as a subject matter expert for assessing threats, threat hunting, mitigation planning, and deploying effective security techniques and network infrastructure design features to ensure company computer network and cyber assets remain secure.My ability to mature existing security programs and postures to proactively mitigate exposure and safeguard organizational data, systems and networks from threats, vulnerabilities, and risks, with a proven record of zero security breaches is evident throughout my career.I strategically align information security with technology and operations by conducting current/future state analysis to develop security postures. My ability to devise roadmaps and contribute expert recommendations to procure, build, manage, and maintain complex, forward-thinking security solutions focused on proactively identifying/mitigating risks and minimizing exposure is unparalleled. I offer a proven history of implementing standard processes and controls to ensure company compliance for enterprise networks in highly regulated industries ensuring compliance to strict HIPAA, ISO, and NIST standards for enterprise network infrastructures and all endpoints.

Aaron Post's Current Company Details
Terumo Blood and Cell Technologies

Terumo Blood And Cell Technologies

View
Product Security Engineer
Denver, CO, US
Website:
tmc.ge
Employees:
146
Aaron Post Work Experience Details
  • Terumo Blood And Cell Technologies
    Product Security Engineer
    Terumo Blood And Cell Technologies
    Denver, Co, Us
  • Forth®
    Cybersecurity Engineer
    Forth® Apr 2024 - Jun 2024
    Schaumburg, Illinois, Us
    Planning, implementing, managing, monitoring, and upgrading security measures for the protectionof the organization’s data, systems, and networks. Designing, implementing, testing, overseeing, and upgrading all security measures needed to protect the organization.Ensures that the organization’s data and infrastructure are protected by enabling the appropriatesecurity controls.Evaluates the organization’s security needs and establishing best practices and standardsaccordingly.Conducts pen testing and vulnerability scans to identify security risks in the network and system. Conducts security assessments, code reviews and vulnerability assessments of systems.Partners with engineering teams to incrementally improve their security processes, priorities,and development needs on a continual basis.Supports and consults with product and development teams in the area of application security,including threat modeling and AppSec reviews.Incident response and ensures that Information Confidentiality, Integrity, and Privacy are always maintained with processing information assets.Security techniques, firewalls, VPN, DNS, and other security systems to include cloud, virtual, and physical/mobile devices.Security evaluation and policies, AWS Cloud Security, Security Audits, Ethical hacking and penetration testing. Binary analysis and cryptography. Browser security and website running processes.Ascertains and finds different solutions to areas of improvement to determine the right solution.Integrating security into the full security software development life cycle (SDLC).
  • Denver Health
    Cybersecurity Architect
    Denver Health Feb 2023 - Oct 2023
    Denver, Co, Us
    Directly assisted various IT teams in project deployment, architecture strategy, risk management, security best practices, cloud security, Azure, web and email proxies, firewalls, vulnerability management, incident response, SAML, single sign-on, multifactor authentication, audits, UEBA, DLP, network access control, AI/automation, DevOps, and Cybersecurity trends.
  • Denver Health
    Is Security Analyst Iii
    Denver Health Apr 2015 - Feb 2023
    Denver, Co, Us
    Apr 2015 – Feb 2023Conducts data loss prevention management, vulnerability management, evaluation of requests for security changes, change management, business strategy and requirements gathering, risk identification, advises on workflow and process improvement, and recommends design enhancements and design simplifications.Monitors the health of critical security systems. Collaborates on methods of improvement. Provides ongoing support and advice to Executive staff, IT staff, and end users on emerging security trends/threats ensuring company security awareness, posture, polices, and procedures are current and relevant.Ensures DevOps security issues and concerns are addressed and mitigated. Conducts audits as needed to maintain technology standards and compliance.Performs security design and code reviews as new equipment, facilities, systems, and software are brought into the environment and consults on industry best practices and design best practices.Develops test plans for security assessment and verification. Assists development and infrastructure teams with security testing methodologies and tools.Configures, operates and monitors automated security testing tools. Performs manual validation of vulnerabilities. Performs manual penetration testing of client systems, web sites and networks to discover vulnerabilities and advises on corrective measures and mitigation efforts. Conducts live and dead box network and host based forensics and data analysis. Leads and manages efforts to perform analysis related to forensic investigations, malware infections, cybercrimes, cyber-attacks, and incident response.Practices, implements, and leads Lean concepts and process improvement.
  • Us Navy
    Cyber Support Network Security Supervisor - Dod 8570 Iat Level Ii
    Us Navy Jun 2013 - Apr 2015
    Washington, Dc, Us
    Directed the vulnerability management and assessment program - Information Assurance Vulnerability Alert (IAVA), Security Technical Implementation Guide’s (STIG’s), Computer Tasking Order (CTO), Information Operation Condition (INFOCON) - designed to assure efficiency of Red Team (RT) / Blue Team (BT) assessments, analysis, assets and tools.Supervised and led three teams of 6 in performing pen-testing engagements, audits, assessments, and analysis of internal and remote computer networks to ensure cyber operations ran securely and that data was protected from both internal and external attacks.Performed security scans and vulnerability exploit tests using vendor utility tools; NESSUS, Core Impact, Metasploit, OpenVAS, BeEF, draids, Canvas, etc. Tested assigned systems to determine the system’s security status and ensured adherence to security policies, procedures and standards. Designed and implemented security system roadmaps. Prepared training materials for computer security education and awareness programs and trained end users through phishing campaigns, privacy walkthroughs, social engineering drills, and basic computer hygiene training.Advised on security requirements and reviewed systems and architecture to determine if they were designed and implemented to comply with established standards.Conducted investigations of security violations and breaches and dictated solutions, executed incident response procedures and prepared reports on intrusions as necessary and provided analysis summaries to senior management. Published findings and remediation efforts to affiliates and provided security posturing authority.Consulted and advised on queries and requests regarding Cybersecurity information, trends, tools and solutions, scalability and expansion, and strategy for both internal and external customers.Provided technical consultation on data center design, network design and provided leadership and work guidance to peers and senior managers.
  • Us Navy
    Cyber Support Network Security Administrator - Dod 8570 Iat Level I
    Us Navy Jul 2012 - Jun 2013
    Washington, Dc, Us
    Port/Service Scanning, Blind Penetration testing/ Black Box testing, Nessus, Cain n Abel, NetBIOS Hacking, Poisoning and Sniffing, Client-side Exploitation, DNS and SMB Relay attacks, SNMP Analysis, Privilege Escalation via Services, Bypassing Antiviruses, Exploitation and scripting with Ruby, XSS and CSRF to gain privileged access, WebApp testing.Managed the installation of new / rebuild of existing physical and virtual servers and workstations. Configured custom hardware, peripherals, services, settings, directories, and storage for security assessments.Performed network monitoring, verifying the integrity and availability of all virtual and physical hardware, server resources, systems, and key processes, reviewed system and application logs, triaged security alerts.Managed Active Directory and domain access, to include Group Policy, account creation, change, and deletion, password rotation, two-factor authentication, VPN access, and privileged account management. Responsible for the vulnerability management program to include monthly scans, canary file assessments, code review, forensic scans to detect unwanted programs, files, and application, threat hunting and signature creation.Managed a team of 7 that configured and designed vulnerable images, pen-testing images, assessment images, virtual Red Team attack labs, virtual Blue Team analysis labs, and open source tools for routine and random pen-testing operations.Responsible for upgrading and configuring system software that supported asset management applications per project and operational needs.Managed and maintained operational, configuration, and disaster recovery procedures.Interpreted and discussed security information with senior management and executive staff. Recommended actions involving security posture, defense in depth, security program enhancements, and advised on architecture and design.
  • Us Navy
    Radar Is Communications Supervisor
    Us Navy Nov 2009 - Jul 2012
    Washington, Dc, Us
    Directly managed the command’s purchasing, acquisition, and calibration budget for Electronic Test Equipment ensuring the ship had all essential equipment and tools necessary for the successful execution of daily operational tasking, maintenance, and repair of shipboard navigation, communications, fire control and missile systems.Supervised 12 personnel in the upkeep, calibration, and issuing of 284 pieces of test equipment, maintaining 100% operability and calibration standards with zero malfunctions or degradation to equipment.Managed 34 shipboard combat computer systems and ensured all equipment was properly maintained including electronic air detection and tracking equipment, electronic recognition and identification equipment, aids to navigation, and electronic equipment and components used for communication, cryptography, and navigation. Developed plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.Reviewed violations of computer security procedures and developed procedures with violators to ensure violations are not repeated.Monitored use of data files and regulated access to safeguard information in computer files.Monitored current reports of computer viruses to determine when to update virus protection systems.Modified computer security files to incorporate new software, correct errors, or change individual access status.Performed risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.Conferred with users to discuss issues such as computer data access needs, security violations, and programming changes.Trained users and promote security awareness to ensure system security and to improve server and network efficiency.Coordinated implementation of computer system plan with establishment personnel and outside vendors.
  • Us Navy
    Is Electronics Technician Lead
    Us Navy Feb 2007 - Nov 2009
    Washington, Dc, Us
    Maintained radar transmitting equipment, radar receiving equipment, radar identification equipment, and air navigation equipment; localizes malfunctions to systems, subsystems, circuits, and parts; inventories installed equipment; completed maintenance reports.Read and interpreted schematics and block diagrams; used test equipment and hand tools; repaired electrical/electronic cables and connectors; localized malfunctions and repaired or replaced faulty parts or subassemblies; aligned, adjusted, calibrated, and performed preventive maintenance on equipment; inventoried tools and portable test equipment.Ensured the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. Developed disaster recovery strategies security compliance strategies and policies.Installed and configured Windows Operating Systems including Windows NT, Windows 2000, XP Vista, and 7 and 2003, 2008R2 Server and Red Hat/Debian Linux systemsConfigured security settings and access permissions for user groups and individual users.Analyzed and reported computer network security breaches or attempted breaches.Identified the causes of networking problems, using diagnostic testing software and equipment.Documented network support activities. Maintained comprehensive security patching on servers, workstations, and network devices.Configured wide area network (WAN) or local area network (LAN) routers or related equipment.Installed network software, including security or firewall software and network backups. Troubleshot network or connectivity problems for users or user groups.Provided telephone support related to networking or connectivity issues.Evaluated local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
  • Us Navy
    Is Electronics Technician
    Us Navy Jun 2006 - Feb 2007
    Washington, Dc, Us
    Coax and Triax Cable Repair.Maintained cable runs.Radar and SATCOM maintenance.Built and installed ethernet and fiber cables.Performed network connectivity tests and developed scripts for routine maintenance.Maintained network communication designed security drawings for proper routing of trafficMaintained Unix/Linux system operations.Performed patch management and vulnerability mitigation.Managed Cisco ASA switching and routing configurations.

Aaron Post Skills

Security Network Security Networking Servers Dod Troubleshooting Training Network Administration Software Installation Computer Security Hardware Team Leadership Customer Service Firewalls U.s. Department Of Defense Penetration Testing Windows 7 Computer Hardware Testing Windows Server Technical Leadership Customer Relations Software Documentation Managing Technical Personnel Computer Forensics Server Administration Information Security Technical Product Management Casb Software As A Service Automation Linux System Administration Disaster Recovery Puppet Software Defined Networking Ansible Qradar Carbon Black Palo Alto Networks Fireeye Cloud Computing Iaas

Aaron Post Education Details

  • Devry University
    Devry University
    Business Technical Management/Cybersecurity

Frequently Asked Questions about Aaron Post

What company does Aaron Post work for?

Aaron Post works for Terumo Blood And Cell Technologies

What is Aaron Post's role at the current company?

Aaron Post's current role is Product Security Engineer.

What is Aaron Post's email address?

Aaron Post's email address is aa****@****hha.org

What is Aaron Post's direct phone number?

Aaron Post's direct phone number is +130360*****

What schools did Aaron Post attend?

Aaron Post attended Devry University.

What are some of Aaron Post's interests?

Aaron Post has interest in Guitar, Children, Android Sdk, Soccer, Linux From Scratch, Education, Science And Technology, Learn Python The Hard Way, Arts And Culture, Health.

What skills is Aaron Post known for?

Aaron Post has skills like Security, Network Security, Networking, Servers, Dod, Troubleshooting, Training, Network Administration, Software Installation, Computer Security, Hardware, Team Leadership.

Who are Aaron Post's colleagues?

Aaron Post's colleagues are Darren Campbell, Ruben Edgar Charcape Montañez, Hideki Hayashi, Nicole Krämer, Nusmira Omerspahic, Gbolahan Ajose, Magdalena Bochra.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.