Aaron Post Email and Phone Number
Aaron Post work email
- Valid
- Valid
- Valid
Aaron Post personal email
- Valid
Aaron Post phone numbers
I started my career in the U.S. Navy where I served for 9 years wearing many hats as a Technology Professional. I was then hired by one of the top healthcare facilities in Denver to mature their mission critical security posture which is vital when dealing with patient records and data.I offer extensive experience designing, securing, and protecting enterprise level government and civilian computer networks. I have been recognized as a subject matter expert for assessing threats, threat hunting, mitigation planning, and deploying effective security techniques and network infrastructure design features to ensure company computer network and cyber assets remain secure.My ability to mature existing security programs and postures to proactively mitigate exposure and safeguard organizational data, systems and networks from threats, vulnerabilities, and risks, with a proven record of zero security breaches is evident throughout my career.I strategically align information security with technology and operations by conducting current/future state analysis to develop security postures. My ability to devise roadmaps and contribute expert recommendations to procure, build, manage, and maintain complex, forward-thinking security solutions focused on proactively identifying/mitigating risks and minimizing exposure is unparalleled. I offer a proven history of implementing standard processes and controls to ensure company compliance for enterprise networks in highly regulated industries ensuring compliance to strict HIPAA, ISO, and NIST standards for enterprise network infrastructures and all endpoints.
-
Product Security EngineerTerumo Blood And Cell TechnologiesDenver, Co, Us -
Cybersecurity EngineerForth® Apr 2024 - Jun 2024Schaumburg, Illinois, UsPlanning, implementing, managing, monitoring, and upgrading security measures for the protectionof the organization’s data, systems, and networks. Designing, implementing, testing, overseeing, and upgrading all security measures needed to protect the organization.Ensures that the organization’s data and infrastructure are protected by enabling the appropriatesecurity controls.Evaluates the organization’s security needs and establishing best practices and standardsaccordingly.Conducts pen testing and vulnerability scans to identify security risks in the network and system. Conducts security assessments, code reviews and vulnerability assessments of systems.Partners with engineering teams to incrementally improve their security processes, priorities,and development needs on a continual basis.Supports and consults with product and development teams in the area of application security,including threat modeling and AppSec reviews.Incident response and ensures that Information Confidentiality, Integrity, and Privacy are always maintained with processing information assets.Security techniques, firewalls, VPN, DNS, and other security systems to include cloud, virtual, and physical/mobile devices.Security evaluation and policies, AWS Cloud Security, Security Audits, Ethical hacking and penetration testing. Binary analysis and cryptography. Browser security and website running processes.Ascertains and finds different solutions to areas of improvement to determine the right solution.Integrating security into the full security software development life cycle (SDLC). -
Cybersecurity ArchitectDenver Health Feb 2023 - Oct 2023Denver, Co, UsDirectly assisted various IT teams in project deployment, architecture strategy, risk management, security best practices, cloud security, Azure, web and email proxies, firewalls, vulnerability management, incident response, SAML, single sign-on, multifactor authentication, audits, UEBA, DLP, network access control, AI/automation, DevOps, and Cybersecurity trends. -
Is Security Analyst IiiDenver Health Apr 2015 - Feb 2023Denver, Co, UsApr 2015 – Feb 2023Conducts data loss prevention management, vulnerability management, evaluation of requests for security changes, change management, business strategy and requirements gathering, risk identification, advises on workflow and process improvement, and recommends design enhancements and design simplifications.Monitors the health of critical security systems. Collaborates on methods of improvement. Provides ongoing support and advice to Executive staff, IT staff, and end users on emerging security trends/threats ensuring company security awareness, posture, polices, and procedures are current and relevant.Ensures DevOps security issues and concerns are addressed and mitigated. Conducts audits as needed to maintain technology standards and compliance.Performs security design and code reviews as new equipment, facilities, systems, and software are brought into the environment and consults on industry best practices and design best practices.Develops test plans for security assessment and verification. Assists development and infrastructure teams with security testing methodologies and tools.Configures, operates and monitors automated security testing tools. Performs manual validation of vulnerabilities. Performs manual penetration testing of client systems, web sites and networks to discover vulnerabilities and advises on corrective measures and mitigation efforts. Conducts live and dead box network and host based forensics and data analysis. Leads and manages efforts to perform analysis related to forensic investigations, malware infections, cybercrimes, cyber-attacks, and incident response.Practices, implements, and leads Lean concepts and process improvement. -
Cyber Support Network Security Supervisor - Dod 8570 Iat Level IiUs Navy Jun 2013 - Apr 2015Washington, Dc, UsDirected the vulnerability management and assessment program - Information Assurance Vulnerability Alert (IAVA), Security Technical Implementation Guide’s (STIG’s), Computer Tasking Order (CTO), Information Operation Condition (INFOCON) - designed to assure efficiency of Red Team (RT) / Blue Team (BT) assessments, analysis, assets and tools.Supervised and led three teams of 6 in performing pen-testing engagements, audits, assessments, and analysis of internal and remote computer networks to ensure cyber operations ran securely and that data was protected from both internal and external attacks.Performed security scans and vulnerability exploit tests using vendor utility tools; NESSUS, Core Impact, Metasploit, OpenVAS, BeEF, draids, Canvas, etc. Tested assigned systems to determine the system’s security status and ensured adherence to security policies, procedures and standards. Designed and implemented security system roadmaps. Prepared training materials for computer security education and awareness programs and trained end users through phishing campaigns, privacy walkthroughs, social engineering drills, and basic computer hygiene training.Advised on security requirements and reviewed systems and architecture to determine if they were designed and implemented to comply with established standards.Conducted investigations of security violations and breaches and dictated solutions, executed incident response procedures and prepared reports on intrusions as necessary and provided analysis summaries to senior management. Published findings and remediation efforts to affiliates and provided security posturing authority.Consulted and advised on queries and requests regarding Cybersecurity information, trends, tools and solutions, scalability and expansion, and strategy for both internal and external customers.Provided technical consultation on data center design, network design and provided leadership and work guidance to peers and senior managers. -
Cyber Support Network Security Administrator - Dod 8570 Iat Level IUs Navy Jul 2012 - Jun 2013Washington, Dc, UsPort/Service Scanning, Blind Penetration testing/ Black Box testing, Nessus, Cain n Abel, NetBIOS Hacking, Poisoning and Sniffing, Client-side Exploitation, DNS and SMB Relay attacks, SNMP Analysis, Privilege Escalation via Services, Bypassing Antiviruses, Exploitation and scripting with Ruby, XSS and CSRF to gain privileged access, WebApp testing.Managed the installation of new / rebuild of existing physical and virtual servers and workstations. Configured custom hardware, peripherals, services, settings, directories, and storage for security assessments.Performed network monitoring, verifying the integrity and availability of all virtual and physical hardware, server resources, systems, and key processes, reviewed system and application logs, triaged security alerts.Managed Active Directory and domain access, to include Group Policy, account creation, change, and deletion, password rotation, two-factor authentication, VPN access, and privileged account management. Responsible for the vulnerability management program to include monthly scans, canary file assessments, code review, forensic scans to detect unwanted programs, files, and application, threat hunting and signature creation.Managed a team of 7 that configured and designed vulnerable images, pen-testing images, assessment images, virtual Red Team attack labs, virtual Blue Team analysis labs, and open source tools for routine and random pen-testing operations.Responsible for upgrading and configuring system software that supported asset management applications per project and operational needs.Managed and maintained operational, configuration, and disaster recovery procedures.Interpreted and discussed security information with senior management and executive staff. Recommended actions involving security posture, defense in depth, security program enhancements, and advised on architecture and design. -
Radar Is Communications SupervisorUs Navy Nov 2009 - Jul 2012Washington, Dc, UsDirectly managed the command’s purchasing, acquisition, and calibration budget for Electronic Test Equipment ensuring the ship had all essential equipment and tools necessary for the successful execution of daily operational tasking, maintenance, and repair of shipboard navigation, communications, fire control and missile systems.Supervised 12 personnel in the upkeep, calibration, and issuing of 284 pieces of test equipment, maintaining 100% operability and calibration standards with zero malfunctions or degradation to equipment.Managed 34 shipboard combat computer systems and ensured all equipment was properly maintained including electronic air detection and tracking equipment, electronic recognition and identification equipment, aids to navigation, and electronic equipment and components used for communication, cryptography, and navigation. Developed plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.Reviewed violations of computer security procedures and developed procedures with violators to ensure violations are not repeated.Monitored use of data files and regulated access to safeguard information in computer files.Monitored current reports of computer viruses to determine when to update virus protection systems.Modified computer security files to incorporate new software, correct errors, or change individual access status.Performed risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.Conferred with users to discuss issues such as computer data access needs, security violations, and programming changes.Trained users and promote security awareness to ensure system security and to improve server and network efficiency.Coordinated implementation of computer system plan with establishment personnel and outside vendors. -
Is Electronics Technician LeadUs Navy Feb 2007 - Nov 2009Washington, Dc, UsMaintained radar transmitting equipment, radar receiving equipment, radar identification equipment, and air navigation equipment; localizes malfunctions to systems, subsystems, circuits, and parts; inventories installed equipment; completed maintenance reports.Read and interpreted schematics and block diagrams; used test equipment and hand tools; repaired electrical/electronic cables and connectors; localized malfunctions and repaired or replaced faulty parts or subassemblies; aligned, adjusted, calibrated, and performed preventive maintenance on equipment; inventoried tools and portable test equipment.Ensured the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. Developed disaster recovery strategies security compliance strategies and policies.Installed and configured Windows Operating Systems including Windows NT, Windows 2000, XP Vista, and 7 and 2003, 2008R2 Server and Red Hat/Debian Linux systemsConfigured security settings and access permissions for user groups and individual users.Analyzed and reported computer network security breaches or attempted breaches.Identified the causes of networking problems, using diagnostic testing software and equipment.Documented network support activities. Maintained comprehensive security patching on servers, workstations, and network devices.Configured wide area network (WAN) or local area network (LAN) routers or related equipment.Installed network software, including security or firewall software and network backups. Troubleshot network or connectivity problems for users or user groups.Provided telephone support related to networking or connectivity issues.Evaluated local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes. -
Is Electronics TechnicianUs Navy Jun 2006 - Feb 2007Washington, Dc, UsCoax and Triax Cable Repair.Maintained cable runs.Radar and SATCOM maintenance.Built and installed ethernet and fiber cables.Performed network connectivity tests and developed scripts for routine maintenance.Maintained network communication designed security drawings for proper routing of trafficMaintained Unix/Linux system operations.Performed patch management and vulnerability mitigation.Managed Cisco ASA switching and routing configurations.
Aaron Post Skills
Aaron Post Education Details
-
Devry UniversityBusiness Technical Management/Cybersecurity
Frequently Asked Questions about Aaron Post
What company does Aaron Post work for?
Aaron Post works for Terumo Blood And Cell Technologies
What is Aaron Post's role at the current company?
Aaron Post's current role is Product Security Engineer.
What is Aaron Post's email address?
Aaron Post's email address is aa****@****hha.org
What is Aaron Post's direct phone number?
Aaron Post's direct phone number is +130360*****
What schools did Aaron Post attend?
Aaron Post attended Devry University.
What are some of Aaron Post's interests?
Aaron Post has interest in Guitar, Children, Android Sdk, Soccer, Linux From Scratch, Education, Science And Technology, Learn Python The Hard Way, Arts And Culture, Health.
What skills is Aaron Post known for?
Aaron Post has skills like Security, Network Security, Networking, Servers, Dod, Troubleshooting, Training, Network Administration, Software Installation, Computer Security, Hardware, Team Leadership.
Who are Aaron Post's colleagues?
Aaron Post's colleagues are Darren Campbell, Ruben Edgar Charcape Montañez, Hideki Hayashi, Nicole Krämer, Nusmira Omerspahic, Gbolahan Ajose, Magdalena Bochra.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial