Alex M.

Alex M. Email and Phone Number

Cybersecurity Professional @ Classified | Threat Hunting - Cyber Intelligence - Insider Threat Detection @ Sumo Logic
Alex M.'s Location
Matthews, North Carolina, United States, United States
Alex M.'s Contact Details

Alex M. work email

Alex M. personal email

n/a
About Alex M.

Avid Threat Hunter and Security Researcher with far-reaching success in Military Intelligence, Telecom, Government, Healthcare and Legal services. Skilled in Penetration Testing, OSINT/SIGINT/HUMINT, Unix/Linux Systems Security and Administration, Network Traffic Analysis, Shell Scripting, and Exploit Analysis. Results driven, lateral thinker and effective communicator with an organized approach to problem resolution, time management, and strategic planning. Experienced Cyber Security professional who is committed to life-long learning and expansion of technological skills to fit the needs of changing marketplace.

Alex M.'s Current Company Details
Sumo Logic

Sumo Logic

View
Cybersecurity Professional @ Classified | Threat Hunting - Cyber Intelligence - Insider Threat Detection
Website:
sumologic.com
Alex M. Work Experience Details
  • Sumo Logic
    Sr. Threat Hunter - Special Ops
    Sumo Logic Nov 2021 - Present
    Redwood City, Ca, Us
    My responsibilities are to acquire and maintain extensive knowledge of the cyber threat landscape from open source and privately produced reports to include advanced threat actors, techniques, capabilities and targets relevant to our industry. • Develop and curate threat intelligence related to industrial control systems (ICS) threats. • Perform technical indicator analysis of cyber threats through in-depth pivoting using internally developed and external tools and services. • Conduct in-depth intrusion analysis of cyber threats utilizing frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model and MITRE ATT&CK. • Develop strategic, tactical and operational intelligence reports for stakeholder dissemination. • Lead key team projects centered around the cyber threat intelligence mission. • Present knowledge and intelligence related to cyber threats at both a technical and management level to help shape both tactical and strategic priorities. • Generate tactical detections and mitigations to support the identification of cyber threats. • Participate in the execution of intelligence-based incident response processes. • Perform extensive OSINT analysis to support daily team intelligence requirements. • Interface with external sharing communities through the sharing of timely and relevant cyber threats.
  • Pfizer
    Cyber Intelligence Lead
    Pfizer Mar 2020 - Nov 2021
    New York, New York, Us
    Lead on the Cyber Threat Intelligence Team responsible for researching and tracking various cyber threats with focus on motives supporting espionage, organized crime, and industrial control system operations.• Develop understanding of the threat landscape through research of advanced threat actors, techniques, capabilities, & targets relevant to pharma vertical• Collect and curate threat intelligence pertaining to Industrial Control System (ICS) & manufacturing threats• Utilize Slavic language skills to conduct extensive OSINT analysis to support daily intelligence requirements• Perform indicator of compromise analysis and intrusion kill chain analysis through in-depth pivoting & utilizing frameworks such as the Lockheed Martin Kill Chain, Diamond Model, & MITRE ATT&CK• Develop Strategic, Tactical, & Operational Intelligence reports for stakeholder dissemination
  • Gsk
    Senior Cyber Security Analyst
    Gsk May 2019 - Mar 2020
    Brentford, Middlesex, Gb
    • Proactively hunted threats to minimize impact to GSK by searching, monitoring, and analyzing machine-generated big data.• Provided computer security incident response including monitoring, detection, investigation, and lessons learned. Assessed and prioritized incidents based on business impact and escalated as necessary.• Researched and analyzed security threat intelligence from a variety of sources. Applied appropriate mitigations for identified indicators of compromise. Suggested changes to security controls as needed to adapt to the changing threat landscape.• Conducted computer forensics investigations including malware sample analysis, memory analysis, network traffic analysis, and imaging and analysis of hard disk drives.• Actively contributed to information security projects and initiatives.• Assumed a lead role when team lead and/or manager was unavailable.• Communicated and managed relationships with end users, IT service providers (both internal and external), and business unit and IT management.• Took ownership of service improvement projects (both technical and procedural).
  • Premise Health
    Security Engineer/Penetration Tester
    Premise Health Jun 2017 - May 2019
    Brentwood, Tn, Us
    -- Participated in the Red Team's execution of penetration tests and vulnerability assessments for internal systems and applications. -- Responsible for compiling the findings of penetration tests and assessments into formal reports that are provided to the system and application stakeholders. -- Interacted with the stakeholders before assessments to coordinate access, to resolve issues during testing, and after assessments to help address security concerns and work with other teams and leadership staff to provide possible remediation options.-- Provided threat detection expertise to the SOC team and occasional support to the security engineering team to assist in the management of security technologies administered by the group (such as the web proxy, IDS/IPS, anti-virus, etc)
  • Petrenko Law Firm
    System Administrator
    Petrenko Law Firm Jun 2007 - Jun 2017
    Bellevue, Washington, Us
    Ensured the network remains secure and protected from threat actors via configuration and monitoring of IDS/IPS, SIEM, WAF, and AV appliances. Tracked malicious activity and hunted for signs of malware across the corporate network. Made sure all information systems are compliant with basic security policies and implement access controls for user account management. Ensured regular backups are performed and accurate logs are maintained. Performed installations and maintenance on all Operating Systems (Windows Server, Sun Solaris Unix, RedHat Linux, vSphere) and other server software/hardware. Performed and maintained operating system patch management on all workstations and servers.
  • Microsoft
    Mobility Specialist
    Microsoft Feb 2006 - Jun 2007
    Redmond, Washington, Us
    Excelled in my capacity as a Mobility Escalation Engineer. Worked with Mobility Original Equipment Manufacturers and Device Manufacturers to resolve technical development issues, so that they can bring their devices to market. Utilized functional knowledge of Windows networking, VPN, RAS, Exchange, creative thinking and willingness to tackle low-level problems on unfamiliar hardware and software. Analyzed operating system and tools source code.
  • T-Mobile
    Mobile Engineer
    T-Mobile Jan 2005 - Feb 2006
    Bellevue, Wa, Us
  • T-Mobile
    Network Operations Technician
    T-Mobile Dec 2003 - Jan 2005
    Bellevue, Wa, Us
  • Wds Global
    Support Engineer
    Wds Global Jun 2002 - Dec 2003

Alex M. Skills

Penetration Testing Shell Scripting Unix Security Exploit Secure Shell Netcat Nmap

Alex M. Education Details

  • Community College Of The Air Force
    Community College Of The Air Force
    Applied Communication Systems Technology
  • Bellevue College
    Bellevue College
    International Relations And Affairs

Frequently Asked Questions about Alex M.

What company does Alex M. work for?

Alex M. works for Sumo Logic

What is Alex M.'s role at the current company?

Alex M.'s current role is Cybersecurity Professional @ Classified | Threat Hunting - Cyber Intelligence - Insider Threat Detection.

What is Alex M.'s email address?

Alex M.'s email address is al****@****zer.com

What schools did Alex M. attend?

Alex M. attended Community College Of The Air Force, Bellevue College.

What skills is Alex M. known for?

Alex M. has skills like Penetration Testing, Shell Scripting, Unix Security, Exploit, Secure Shell, Netcat, Nmap.

Who are Alex M.'s colleagues?

Alex M.'s colleagues are Leanne Martin, Kurt Purnell, Caroline Scholtens, Damon Truong, Noah Kagan, Jonathan Ogilvie, Mani K.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.