Chris Rogers

Chris Rogers Email and Phone Number

Sr Cyber Security Analyst at PUNCH Cyber. @ PUNCH Cyber Analytics Group
Chris Rogers's Location
Harwood, Maryland, United States, United States
Chris Rogers's Contact Details
About Chris Rogers

Chris is a veteran of the security industry with 30 years of experience. Starting his career in government intelligence he fielded multiple experimental intelligence systems which made for an easy transition to the mainstream computer security industry. Chris has performed forensic analysis on hundreds of machines and thousands of malicious files in his career. Over the last 20 years Chris has held the position Manager, Team Lead, Mentor, and Senior Analyst both in government and commercial environments. Chris has developed training models, materials, and metrics which he used in the successful tutelage of dozens of intrusion forensics examiners and/or malware analysts. He has also presented at Security B-Sides in DC, NOVA, and Austin.

Chris Rogers's Current Company Details
PUNCH Cyber Analytics Group

Punch Cyber Analytics Group

View
Sr Cyber Security Analyst at PUNCH Cyber.
Chris Rogers Work Experience Details
  • Punch Cyber Analytics Group
    Sr Cyber Security Analyst
    Punch Cyber Analytics Group Sep 2023 - Present
    Ashburn, Va, Us
  • Secunetics
    Senior Threat Analyst
    Secunetics May 2021 - Oct 2023
    Sterling, Virginia, Us
  • Cyberdefenses, Inc.
    Malware Analyst, Intrusion Forensics, All Around Great Guy
    Cyberdefenses, Inc. Sep 2017 - May 2021
    Round Rock, Tx, Us
    Forensics and Incident Response is in my blood, so I am glad I am here. Even though 80-90% of our incidents are ransomware based. I am a ransomware expert in the response / forensics realm so I am currently in the right spot. Just got my Private Investigator license which helps with the companies we deal with casework. Oh yeah and I am still a great guy. Yet another big win as of late is that a second customer caught some weirdness early on, called us in, and we stopped an active attack. Was fun kicking the attacker out and doing live network protections and forensic analysis before exfiltration and encryption happened.
  • Fusionx
    Incident And Forensics Consultant
    Fusionx Mar 2016 - Sep 2017
    Arlington, Virginia, Us
    FusionX is one of the premier Red/Blue Teams in the world. While there I got to work IR/Forensics with a first class team. We worked Shamoon II before it was cool and slapped FIN7 around awhile. Like all things in life the only constant is change and although we had some amazing experiences it was time for us to part ways. My hearts desire will always be to stay tactical and technical in this field.
  • Fidelis Cybersecurity
    Senior Threat Research Analyst
    Fidelis Cybersecurity Apr 2014 - Apr 2016
    Riverside, Ca, Us
    • Daily monitoring of open source and customer telemetry data to identify threat indicators. Then researched, vetted, and used the indicators in our systems to protect our customers in a timely manner. • Reverse engineering of binaries for actionable indicators. Then adding indicators into our Crits database to perform correlation and context. • Fielded multiple analysis requests from customers and sales teams, which included Forensic Data analysis, Binary analysis, and intelligence research culminating in a comprehensive report.• Authored and co-authored various outreach items to include a recent presentation Deductive Reasoning: File Analysis Techniques, whichwas presented at B-Sides DC.• Tracked multiple malware families and samples types through open source and internal analysis to provide new intelligence and author updates or new rules when appropriate.
  • Bank Of America
    Vice President Specialist Information Security Engineer
    Bank Of America Apr 2012 - Apr 2014
    Charlotte, Nc, Us
    Vice President – Technical Manager / Senior Malware Analyst• Trained multiple individuals on multiple teams coveringbasic/advanced file review for malicious artifacts.• Helped Identify and collect metrics for a team that not only was newbut in a constant state of flux.• Engaged senior management on multiple occasions relating malwaredetails to the technical level of the group.• Identified malicious content in files through analysis.• Coordinated response and review of malware.• Engaged proper teams/team leads for incident response based on threat/risk analysis.• Managed a fluctuating team in size and purpose to accomplish aconstantly changing mission.• Analyzed logs or third party information for intelligence and validationof content.• Network reconnoitered and reviewed live domains for maliciouscontent.
  • Teksystems
    Computer Security Engineer / Malware Analyst
    Teksystems Nov 2011 - Apr 2012
    Hanover, Md, Us
    I telework for a large company based out of North Carolina as a computer security engineer specializing in malware analysis. My last job was incredible but this opportunity affords me time to spend with my family which is priceless. This also allows me the opportunity to work on a live infrastructure and with the entire incidence response cycle which will help keep my skills fresh while rounding out my knowledge base and experience.
  • Gd-Ais
    Computer Forensic Examiner
    Gd-Ais 2005 - Nov 2011
    Fairfax, Va, Us
    Criminal and Intrusion forensic analysis performed on systems, media, malware, and logfiles. Served as intrusion section liaison to the configuration management board. Served on the Professional Development Board. Acted as a mentor and successfully trained a section that more than doubled in size.
  • Defense Computer Forensics Laboratory
    Computer Forensic Examiner (Intrusions)
    Defense Computer Forensics Laboratory 2005 - Nov 2011
    Intrusion Analyst and Team Mentor • Conducted in depth intrusion examinations on well over 100 filesystems that included a wide variety of operating systems.• Analyzed a multitude of malware samples using various witness tools,debuggers, and dis-assemblers.• Searched through various formatted log files for anomalies to identifypotential attacker activity.• Used packet capture files to rebuild intruder tools and other maliciousfiles.• Successfully mentored 11 people new to the forensics and intrusionfield on performing examinations. • Served as the sections Configuration Management representative.• Served as the sections Professional Development Board representative.• Conducted over 40 criminal forensic examinations on various amountsand types of media to provide unbiased reports and/or testimony.• Testified in three article 32 (Military Grand Jury) hearings.
  • Dmsi International
    Information Assurance / Security Engineer
    Dmsi International Sep 2004 - Jun 2005
    North Venice, Fl, Us
    • Provided guidance to developers and engineers to help secure thePentagon’s networks.• Worked closely with customer service to tactfully handle securityincidents.• Helped create a secure operating system while ensuring operability ofkey features and tools.• Conducted log analysis and removal of unauthorized software fromusers systems.
  • General Dynamics Advanced Information Systems
    System Engineer
    General Dynamics Advanced Information Systems 2003 - 2004
    Fairfax, Va, Us
    Security Engineer / Information Assurance• Provided technical support to a wide variety of callers.• Helped transition the watch desk from FBI to Department of HomelandDefense.• Responsible for various reports and situational information updatesregarding computer security.
  • Mantech International Systems
    Software Analyst
    Mantech International Systems 2002 - 2003
    Milsons Point, New South Wales, Au
    Diplomatic Security - Software Analysis Branch (Mantech) 2002 –2003• Conducted software analysis and review of potential vulnerabilities prior to integration into DoS networks. • Served as member of the Security review board while in diplomatic security as voting team member.
  • Iteq
    Firewall Tech / Teamlead
    Iteq 2000 - 2002
    Firewall Contractor (Team Member) / (Team Lead) (ITEQ) 2000 – 2002• Supported the Department of State networks through firewall deployment, monitoring, analysis, and maintenance.
  • Army National Guard
    Interrogator
    Army National Guard 1997 - 2000
    Arlington, Virginia, Us
    97E Human Intelligence (Interrogator)• Ran a team of interrogators under a new “Go Team” counter intelligence initiative to include integration of new technology.
  • Us Army
    Signals Intelligence Analyst
    Us Army 1990 - 1997
    Arlington, Virginia, Us
    98C Signals Intelligence Analyst• Performed intelligence analysis in both strategic and tactical roles. • Fielded experimental hardware to include a variety of computer based and communication security based technologies.

Chris Rogers Skills

Computer Security Malware Analysis Information Assurance Information Security Vulnerability Assessment Computer Forensics Security Firewalls Forensic Analysis Cissp Information Security Management Incident Response Ips Intrusion Detection Analysis Network Security Penetration Testing Encase Security Clearance Vulnerability Management Reverse Engineering Dod Ids Cybercrime Security Audits Security Awareness Pci Dss Application Security Offensive Guard Yara Threat Research Being Bald Dynamic File Analysis A Certified Leadersip Cyber Adversary Categorization Leadership

Chris Rogers Education Details

  • Prince George'S Community College
    Prince George'S Community College
    Computer Science

Frequently Asked Questions about Chris Rogers

What company does Chris Rogers work for?

Chris Rogers works for Punch Cyber Analytics Group

What is Chris Rogers's role at the current company?

Chris Rogers's current role is Sr Cyber Security Analyst at PUNCH Cyber..

What is Chris Rogers's email address?

Chris Rogers's email address is ro****@****ast.net

What is Chris Rogers's direct phone number?

Chris Rogers's direct phone number is +157135*****

What schools did Chris Rogers attend?

Chris Rogers attended Prince George's Community College.

What skills is Chris Rogers known for?

Chris Rogers has skills like Computer Security, Malware Analysis, Information Assurance, Information Security, Vulnerability Assessment, Computer Forensics, Security, Firewalls, Forensic Analysis, Cissp, Information Security Management, Incident Response.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.