Christopher Perkins Email and Phone Number
Christopher Perkins personal email
- Valid
- Valid
- Valid
- Valid
- Valid
Christopher Perkins phone numbers
CURRENT CERTIFICATIONSCompTIA Security+EC Council Certified Ethical Hacker (CEH)Cisco Certified Network Associate (CCNA)Cisco Certified Entry Network Technician (CCENT)Going through Background Check to be a mentor for the CYBERPATRIOT GroupEDUCATION AND TRAINING UMBC Cyber Security Academy for Cyber Operations June 2013 to October 25, 2013 Basic components of network theory, major network communications methods, network data delivery methods, network media and hardware components, major types of network implementations, components of a TCP/IP network implementation, major services deployed on TCP/IP networks, components of LAN and WAN implementation, major issues and technologies in network security, component of a remote network implementation, major issues and technologies in disaster recovery, major data storage technologies and implementations, primary network operating systems, tools, methods, and techniques used in managing a network, and troubleshooting network issues. Computer hardware, operating systems and networks, and specific skills required to implement basic security services on any type of computer network. In-depth knowledge and practical experience with the current essential security systems. Understanding how perimeter defenses work, how intruders escalate privileges and what steps can be taken to secure a system. Intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN. Basic mitigation of security threats and an introduction to wireless networking.Familiarization and hands-on usage of VMware, Packet Tracer, Ubuntu, TCPdump, Wireshark, Metalgo, Armitage, and many more programs.
Ntt Data
View- Website:
- nttdata.com
- Employees:
- 41529
-
Network Security, Incident Response, Dlp AnalystNtt DataSykesville, Md, Us -
Senior Team Lead/Incident Response/Network Security/Dlp AnalystNtt Data Jan 2018 - PresentTokyo, JpShop/SOC lead analyst responsible for investigating any and all security Incidents that are reported from NIH to NIAID SIRT SOC. Collaborate with NIH Incident Response Team (IRT) along with NIAID Customer Service Branch to investigate/resolve any and all computer security events. Routinely speaks with end users to get verification of an incident Leads and mentor’s junior analyst on our team. Regularly utilize our toolset (Extra-Hop, Splunk ES, Crowdstrike, Absolute, Cyber Triage, Magnet Axiom, Threat Connect and other open source tools) to proactively search for any Indicators of Compromise (IOC’s) Responsible for the initial installation and troubleshooting of our Symantec Data Loss Protection solutions and the main POC for the verification of events triggered. Main POC for the proof of concept between Extra-Hop and NIAID. Worked with the vendor and our system admins to tune and troubleshoot system. Responsible for the verification of all findings along with creating tickets in our Service Now queue. Responsible for enforcing the HHS memorandum for traveling OCONUS with Government Furnaced Equipment. Utilize Absolute along with its Geographic Location services to verify what country the device is located. Also communicate with the Government AO or Supervisor for verification of travels. One of the main analysts using CrowdStrike to hunt for IOC’s. Still in POC/ testing phase. -
OwnerThe Power Of Positive Touch, Llc Apr 2008 - Jul 2020I owned and operated The Power of Positive Touch, I worked with Athletes of all calibers from weekend warriors who just want to go out and tear it up on the weekends to Iron man Triathletes that need to be at the top of their game.
-
Security Analyst At 14West In Baltimore14 West Nov 2016 - Mar 2017Waukesha, Wi, UsUse the latest SIEMS and other end point protection products to track down possible Adware, Trojans, EXE's and Hacking tools etc. that are not allowed to be downloaded onto our systems. Latest project is a Phishing Campaign. -
It Security AnalystNci-Advancemed Apr 2014 - Nov 2016Reston, Va, UsPart of a team known for providing outstanding technical support and professionalism to ensure customer satisfaction, review violations of computer security procedures and discusses procedures with violators to ensure violations are not repeated, monitor use of data files and regulates access to safeguard information in computer files and perform risk assessments. Continually monitoring our DLP systems for any sign of PII or PHI being sent out that is not encrypted. • Assisted in standing up a new Virtual RHEL server• Stood up Nessus L.C.E (Log Correlation Engine) and P.V.S (Passive Vulnerability Scanner)• Point man for our Incident Management System, I search our network for any I.O.C's (Indicators of Compromise) that are provided to us by the FBI. -
It Security AnalystSocial Security Administration Jan 2014 - Apr 2014Baltimore, Md, UsUtilize Splunk, Sourcefire, Arc-Sight and Blue-Coat software to detect potential incoming threats to the SSA network. I am part of a team that monitors all spam emails, checking them for any malicious content, possible re-directional URL’s, spoofed sites along with monitoring spam emails for viruses, pulling the URL checking if it has been black listed and running it against Virus Total. Stay in constant contact with the firewall team to adjust our ACL’s to alleviate the threats to our system. Research Bot-nets, DOS attacks and possible Malware downloaded on host machines -
Cyber Security StudentUmbc Training Centers Jun 2013 - Oct 2013Columbia, Md, UsBasic components of network theory, major network communications methods, network data delivery methods, network media and hardware components, major types of network implementations, components of a TCP/IP network implementation, major services deployed on TCP/IP networks, components of LAN and WAN implementation, major issues and technologies in network security, component of a remote network implementation, major issues and technologies in disaster recovery, major data storage technologies and implementations, primary network operating systems, tools, methods, and techniques used in managing a network, and troubleshooting network issues. Computer hardware, operating systems and networks, and specific skills required to implement basic security services on any type of computer network.
Christopher Perkins Skills
Christopher Perkins Education Details
-
Umbc'S Cyber Acadamy -
UmucCyber Security
Frequently Asked Questions about Christopher Perkins
What company does Christopher Perkins work for?
Christopher Perkins works for Ntt Data
What is Christopher Perkins's role at the current company?
Christopher Perkins's current role is Network Security, Incident Response, DLP Analyst.
What is Christopher Perkins's email address?
Christopher Perkins's email address is ip****@****hoo.com
What is Christopher Perkins's direct phone number?
Christopher Perkins's direct phone number is +141086*****
What schools did Christopher Perkins attend?
Christopher Perkins attended Umbc's Cyber Acadamy, Umuc.
What are some of Christopher Perkins's interests?
Christopher Perkins has interest in Exercise, Sweepstakes, Home Improvement, Reading, Sports, Golf, Health, Cooking, Cruises, Outdoors.
What skills is Christopher Perkins known for?
Christopher Perkins has skills like Computer Security, Network Security, Therapeutic Massage, Information Security, Ccna, Penetration Testing, Vulnerability Assessment, Deep Tissue Massage, Information Security Management, Firewalls, Security, Ceh.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial