Alyson Van Stone, Mba Email and Phone Number
๐๐ Mentorship Mondays is currently on hiatus, but I hope to bring it back soon! ๐๐Hi, Iโm Alyson! ๐๐ป๐ My background is in business, specifically marketing, and recently I made a career change into cybersecurity. Iโm now working as a BISA, a Business Information Security Analyst. Itโs a very unique role in the industry that bridges the gap between two departments that often speak completely different languages โ the cybersecurity (aka information security or IT security) team and the rest of the business (marketing, finance, legal, etc).๐ I love this role for several reasons! First, because it makes a great impact on the organization by fostering more effective communications and strengthening relationships across multiple teams. In this capacity, I rely heavily upon my soft skills and business acumen. ๐ Secondly, I am able to utilize the cybersecurity skills and knowledge Iโve obtained over the past three years. I work directly with subject matter experts across all areas of cybersecurity - offense/defense, cloud, IAM, AppSec, GRC, and more! My technical learning and development is a constant work in progress, and seeing my growth here is super exciting and motivating!๐ And lastly, I love this work because of its overall mission. Every day I get to help people. I feel so good about doing work that matters. Cybersecurity risk is not something that will ever go away, but I can do my best to protect myself, my family and friends, my company and other businesses.I'm also now working as a part-time cybersecurity instructor for one of the universities located in Florida. It is the same program I graduated from in June 2022, and I'm so happy to be back, this time to teach what I've learned and to help others launch their own cybersecurity careers. It's such a rewarding experience!It truly takes a village. My career success wouldnโt have been possible without my amazing network here on LinkedIn. Youโve all played a part and I thank you so much for that. I hope that I can give back to each of you so that this wonderful community continues to grow and all of our dreams come true. ๐๐P.S. You will not see the names of my current employers here on LinkedIn in order to prevent phishing attempts and other security issues. It also protects me from potential legal issues. While this is a public platform, my account is personal to me (not owned by any of my employers) and all views I express here are my own. An extra benefit of not disclosing my employer names is fewer sales pitches in my inbox here too!
Make Waves Marketing
View-
Cybersecurity ConsultantUndisclosed May 2022 - Presentโข Performed full security audit for a recently compromised small business ownerโข Identified the attack, responded to the incident, and hardened systems to prevent future attacksโข Explained technical security concepts and trained client on security awareness best practicesโข Conducted risk assessment and recommended control selections to reduce risk to an acceptable levelโข Planned, designed, and managed information security initiatives in support of confidentiality, integrity, and availabilityโข Wrote technical documents and published cybersecurity content to educate users of social media platforms and search engines
-
Founder & Lead Digital Marketing ConsultantMake Waves Marketing Jul 2016 - PresentDigital Marketing & Content Creation Services | We Help Small Businesses Make Big WavesSERVICES:โข Providing general business management and marketing services to small business clients and entrepreneurs across a variety of industriesโข Creating digital marketing strategies and executing content marketing, search engine optimization (SEO), search engine marketing (SEM/Google Ads), email marketing (Mailchimp, Kartra), social media marketing (Facebook, Instagram, TikTok, Clubhouse), online advertising (social media & Google Ads), website optimization, influencer marketing, affiliate marketing and salesโข Analyzing digital marketing campaigns using Google Analytics and social media analyticsRESULTS:โข Wrote strategic plan to drive incremental revenue of $3.3M through integrated digital marketing campaigns and expansion into new channelsโข Developed new online revenue stream to add $144K per year in incremental, passive incomeโข Completely revamped a clientโs operations and administrative systems to save $58K a year and significantly reduce staffโs time spent on reporting and analyticsโข Grew Instagram account organically by over 1,000 targeted followers in 2 weeks, achieved 22% engagement rate -
Board MemberWomen In Cybersecurity (Wicys) Florida Jan 2023 - Aug 2023Pensacola, Fl, Us -
Governance, Risk, And Compliance (Grc)Cybersecurity Home Lab Mar 2023 - Mar 2023โข Prepared, executed, and reported on audit of NIST SP 800-53 cybersecurity controls that included interview, document review, and testing of systems to support compliance audit activitiesโข Applied knowledge of NIST Cybersecurity Framework and how the Identify, Protect, Detect, Respond, and Recover categories comprise and facilitate an information security programโข Quantitatively analyzed cybersecurity risk using NIST SP 800-30 to identify highest system risksโข Executed threat modeling exercise to determine higher likelihood threat eventsโข Developed information security policy to establish authorized access management and authenticator management for internal and third-party personnelโข Ensured policy documents are aligned with business objectives, implementable by the organization, and practical for compliance โข Incorporated operational perspective and constraints throughout policy purpose, scope, and authority
-
Digital Forensics & Incident Response (Dfir) - Part 3 - And Threat HuntingCybersecurity Home Lab Jun 2022 - Jun 2022Threat Huntingโข Conducted IoC research by downloading malware, identifying the indicators of compromise (IoCs) and the incident using Wiresharkโข Utilized ThreatConnect, a Threat Intelligence Platform (TIP), to research the Mimikatz exploitation toolโข Created persistent malware using MSF, and hunted for its processesStatic Malware Analysisโข Performed basic static malware analysis on a file and wrote a report on my investigation findingsโข Investigated dynamic-link library (DLL) files to identify functionality and potential malwareDynamic Malware Analysisโข Executed malware in a Cuckoo sandbox environmentโข Analyzed file system changes, network activity, registry changes, utilized Sysinternals Autoruns tool, Process Explorer, Regshot, and Process Monitor (ProcMon) to investigate a malware sample and identify IoCs.โข Created malware with MSFvenom and investigated it with dynamic investigation tools such as Netstat, online block list databases, FakeNet-NG and INetSimNetwork Forensicsโข Set up and reviewed data from a reverse proxyโข Used Zeek, a network security monitor, to detect and investigate a DNS tunnelโข Followed the following steps in malware investigation: 1. Checked for malware signatures, used an IDS, 2. Identified traffic abnormalities using Wireshark, 3. Identified key stations, 4. Filtered by IoCs and gathered data, 5. Analyzed the protocol dataMalware Defense & Persistenceโข Conducted an APT investigation and located persistent malware in a victimโs machineโข Discovered an information leakage caused by a computer
-
Digital Forensics & Incident Response (Dfir) - Part 2Cybersecurity Home Lab May 2022 - May 2022Windows Dead Analysis:โข Investigated a raw image file using PowerForensics and determined where an attack originatedโข Created a disk image and uncovered the original content from alternate data streamsโข Accessed and retrieved hidden data from an image file using file carving techniques with the Binwalk tool and a hex editorMemory Analysisโข Inspected an image for IoCs (indictors of compromise) revealing the system was infected with WannaCryโข Investigated processes using pslist and pstree, investigated network activity using connscan and socket, investigated DLLs using dlllist, kerberos.dll, and netlogon.dll and detected a code injection using malfindLinux Forensicsโข Created a forensics acquisition CD with static binaries and used it to extract information from a Linux OSโข Investigated a server image and identified deleted and modified filesโข Mimicked bind shell behavior and conducted a live analysis of the /proc/ directory contentLog Analysis & Timelineโข Searched for events in Windows Event Viewer to understand their structureโข Examined the Event Viewer investigation process via SQL queriesโข Deleted and modified logs in Linux and Windows machines to mimic attack techniquesDFIR Simulationโข Handled a โreal-lifeโ DFIR investigation scenario through a Capture the Flag (CTF) challenge
-
Digital Forensics & Incident Response (Dfir) - Part 1Cybersecurity Home Lab Apr 2022 - Apr 2022Introduction to DFIR:โข Discovered evidence of programs executed upon startup using AutoRuns64โข Recovered files from a suspicious USB drive and proved they were used to steal sensitive data, used HashMyFiles to verify match between leaked and suspected files, also used exiftool to examine metadataโข Analyzed multiple attack scenarios in an organization, and recommended the best DFIR methodology to applyIncident Response Preparation:โข Deployed Lansweeper to scan a network and identify, map, manage and protect assetsโข Created incident response plans for alerts including the four phases of preparation, identification, containment, and eradicationIncident Response Implementation:โข Assigned priorities to incidents based on the methodology of function, information, and recovery (FIR)โข Successfully contained a malicious program (that was spreading infection and controlled by an intruder) by air gapping the network and creating a sandbox environment in a FLARE virtual machineData Acquisition:โข Created a drive capture using CAINE (Computer Aided Investigative Environment) Linux distribution for digital forensicsโข Created a disk image with FTK Imager and mounted it using OSFMountโข Captured the RAM of a virtual machine (using FTK Imager) and acquired basic information about it using Volatility in a SIFT (Sans Investigative Forensics Toolkit) Workstationโข Configured Windows 10 to create a memory dump during a system crashWindows Live Analysis:โข Conducted a forensics review of web browser usage by examining the DNS cacheโข Identified USB connection history using NirSoftโs USBDeview toolโข Investigated browser history using NirLauncherโข Identified evidence within prefetch files that a deleted program was previously executed on a computer, using the WinPrefetchView toolโข Looked for suspicious activity in the registry using regeditโข Examined web history using NirSoftโs MyLastSearch
-
Ethical HackingCybersecurity Home Lab Mar 2022 - Apr 2022โข Executed a variety of mock cyberattacks in a virtual lab environment, including social engineering, man-in-the-middle/on-path, brute-force, cryptographic, network, database, and application attacksโข Conducted reconnaissance and bypassed defense systemsโข Enumerated organizations and exploited services and portsโข Performed privilege escalation to become a system administratorโข Seized control over websites, web platforms, and their host serversโข Used advanced web application penetration techniques such as Cross-Site Scripting (XSS) and file inclusion, to discover and exploit vulnerabilities in cloud-based systemsโข Compromised a database with SQL injectionโข Conducted vulnerability scanning and wrote penetration testing reports with security defense recommendationsKey Tools used:Nmap, Hping3, Masscan, Arpspoof (dSniff), Bettercap, SSL Strip, John the Ripper, Rar2John, Hashcat, Common User Passwords Profiler (CUPP), Hydra, Medusa, Ncrack, SEToolkit, HiddenEye, WinRAR Self-Extracting Archive (SFX), Metasploit, Searchsploit, Reverse shells, Meterpreter, Bloodhound, HTTP servers Apache2 and Nginx, Burp Suite, SQLMap, OWASP Zed Attack Proxy (ZAP), Nikto, bWAPP (buggy web application)
-
Python For SecurityCybersecurity Home Lab Mar 2022 - Mar 2022โข Set up a Python environment in Windows and Linuxโข Used and customized PyCharm as my IDE (Integrated Development Environment)โข Executed nested loopsโข Created a range with various inputs in a loopโข Built a calculatorโข Created a network client and server socket, built basic connectivity between the twoโข Wrote an ARP poisoning detector to detect On-Path (aka Man-In-The-Middle) attacksโข Resolved errors in code using try and except statements
-
Cyber Infrastructure & TechnologiesCybersecurity Home Lab Feb 2022 - Feb 2022โข Bypassed anti-virus software using file encryption techniquesโข Implemented endpoint detection and response (EDR) security suitesโข Created YARA rules to find malicious applications at endpointsโข Updated a ClamAV virus database with the YARA rules and an allow-listโข Installed a Modern Honey Network (MHN), configured a Dionea honeypot, simulated attacks on the honeypotโข Configured a Valhalla honeypot to capture POP3 trafficโข Demonstrated data loss prevention (DLP) techniques through regular expressions โข Connected to a POP3 machine with Telnet and used POP3 commands to view messagesโข Established understanding of a log fileโs flow, from creation to processing in a SIEM, to determining whether or not it classifies as an alertโข Worked with Splunk as a SIEM service to monitor infrastructureโข Configured Snort, an open-sourced Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), on pfSense and monitored ICMP traffic with rulesโข Automated processes using Security, Orchestration, Automation, and Response (SOAR) for better incident managementโข Used Shodan to locate Industrial Control System (ICS) componentsโข Designed a secure network architecture
-
Networking SecurityCybersecurity Home Lab Jan 2022 - Jan 2022โข Utilized Cisco Packet Tracer to examine and troubleshoot network behavior and evaluated network security threat typesโข Configured security settings for a Cisco network switch and a Cisco ASA firewallโข Created, deleted, and managed VLANs and Trunk linesโข Configured Open VPN connections and TOR browserโข Implemented Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS) using Snort and Suricata
-
Linux SecurityCybersecurity Home Lab Dec 2021 - Dec 2021โข Created and managed ownership of Linux files and foldersโข Executed common commands using the GUI and Terminal Emulatorโข Installed packages, software updates, and upgradesโข Configured network settings using Linux commandsโข Identified and minimized network and workstation vulnerabilitiesโข Wrote scripts to automate IP blocking and other system hardening techniquesโข Leveraged Linux System Service Management to implement features, services, and perform critical system tasksโข Utilized the Bash default shell and scripting tool to automate repetitive tasks and functionsโข Established password and user policies to prevent data theft
-
Cloud SecurityCybersecurity Home Lab Nov 2021 - Dec 2021โข Established off-premise services in the cloud by setting up an AWS (Amazon Web Services) account with an Amazon EC2 (Elastic Compute Cloud) instanceโข Implemented AWS IAM (Identity Access Management)โข Created a network in UniFi SDN and a virtual applianceโข Used Amazon Security Groups and Amazon Inspector to secure data in the cloud
-
Computer NetworkingCybersecurity Home Lab Oct 2021 - Nov 2021โข Applied networking concepts including protocols such as TCP/IP, topologies, and network devicesโข Investigated network traffic using Wireshark and Nagiosโข Managed Cisco device configurations and system filesโข Executed port security commands on a Cisco switchโข Configured SSH, configured and verified IPv6 addressing on a routerโข Configured IPv4 standard, default, summary and dynamic routesโข Conducted troubleshooting on network issues using CDP, LLDP, Syslog, and NTPโข Utilized the ACL (Access Control List) and configured firewall for network securityโข Set up a DHCP service on a Cisco router
-
Microsoft SecurityCybersecurity Home Lab Sep 2021 - Oct 2021โข Managed, operated, and hardened a Microsoft domain environment (Windows 2016 Server) along with newer operating systems (Windows 10 Client and Windows 2019 Server)โข Implemented configuration utilities in the Windows OS (both client and server)โข Deployed a domain controller on the server with the Active Directory Domain Services role installedโข Created users and groups and utilized the Group Policy tool to manage securityโข Performed a remote connection to a Windows machine using Remote Desktop protocol (RDP)โข Executed Windows maintenance tasks such as updates and backups to support system healthโข Practiced DNSSEC in a Windows environment to protect against cyberattacksโข Utilized BitLocker, User Access Control, and Windows Defender to strengthen defensesโข Explored execution policy modes and bypass techniquesโข Wrote scripts using PowerShell to automate tasks from the command line
-
Introduction To CybersecurityCybersecurity Home Lab Jul 2021 - Aug 2021Began my cybersecurity experience by completing project #1 of over 250 for the year!Installed and configured Oracle VirtualBox to run virtual machines for further lab work.
-
Business Strategy Manager | Category Marketing AnalystB&G Foods Inc. Sep 2011 - Aug 2016Parsippany, New Jersey, Usโข Wrote strategic plan to achieve growth and profitability goals for Sales and Marketingโจโข Managed cross-functional teams including Finance, R&D, and Operations to align on corporate strategic objectives โจโข Extracted key consumer and customer insights from vast amounts of data and a variety of research sources to make fact-based decisions โจโข Developed and tested concepts for innovative new products generated by qualitative and quantitative data analysis, industry trends, and consumer insightsโข Supervised and managed 5 vendor teams with a total of 17 indirect reportsโข Managed Nielsen and Market Track contracts, led successful year-end negotiations -
Assistant Marketing ManagerL'Orรฉal May 2010 - Aug 2011Paris, Frโข Managed salon professional brands in the haircolor and texture categories to achieve sales goals of $22.5M โข Launched a new haircolor brand to a multicultural, niche target marketโจโข Contributed innovative ideas for brand strategy and operational marketing planโจโข Planned and executed promotions, local advertising and media strategyโจโข Managed marketing budget, product forecast, inventory, COGs, and pricing -
Product Management Mba InternChurch & Dwight Co., Inc. May 2009 - Aug 2009Ewing, New Jersey, Us -
Professional Biological Products SpecialistSanofi Pasteur 2006 - 2008Paris, France, Fr -
Healthcare RepresentativePfizer 2004 - 2006New York, New York, Us -
Project ManagerIri 2003 - 2004Chicago, Il, Us
Alyson Van Stone, Mba Skills
Alyson Van Stone, Mba Education Details
-
Continuing Education At The University Of MiamiCybersecurity Professional Certification -
Fordham Gabelli School Of BusinessMarketing And International Business -
Villanova School Of BusinessMarketing
Frequently Asked Questions about Alyson Van Stone, Mba
What company does Alyson Van Stone, Mba work for?
Alyson Van Stone, Mba works for Make Waves Marketing
What is Alyson Van Stone, Mba's role at the current company?
Alyson Van Stone, Mba's current role is Business Information Security Analyst (BISA) - as a strategic liaison, I bridge the gap between enabling the business and mitigating cybersecurity risk ๐๐ | Future BISO | Adjunct Instructor | CompTIA Security+.
What schools did Alyson Van Stone, Mba attend?
Alyson Van Stone, Mba attended Continuing Education At The University Of Miami, Fordham Gabelli School Of Business, Villanova School Of Business.
What skills is Alyson Van Stone, Mba known for?
Alyson Van Stone, Mba has skills like Product Marketing, Grc, Consulting, Splunk, Amazon Web Services, Linux, Hubspot, Salesforce.com, Active Directory, Cybersecurity, Burp Suite, Microsoft Powerpoint.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records ร $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial