Dahvid Schloss Email and Phone Number
Dahvid Schloss work email
- Valid
- Valid
Dahvid Schloss personal email
- Valid
I am a strategic cybersecurity director with 13+ years of proven experience in designing and enforcing robust security policies, managing risks, and aligning cybersecurity strategies with organizational objectives. Over the course of my career, I have led and nurtured high-performing teams, consistently bolstering security across physical, social, and cyber domains in diverse industries. Trusted by over 100 clients, I have excelled in devising and implementing strategic security enhancements. Beyond my leadership and advisory roles, I am recognized for my public speaking prowess and proud to hold a coveted DEFCON Black Badge.I am an advocate for a proactive cybersecurity culture, leading by example and fostering a collaborative environment that encourages continuous learning and improvement. I ensure that my team members are my top priority, and I stand by the phrase I learned in the military: "Leaders eat last."My international background further enriches my leadership style. As the son of an immigrant and having lived in various countries, including Japan, the UK, and Iraq, I bring a diverse cultural understanding to my roles. My experiences have equipped me to work seamlessly with organizations globally, a skill complemented by my ongoing efforts to improve my Spanish and Japanese language abilities.Summary of Qualifications:• Directed teams to enhance physical, social, and cyber security across diverse industries• Successfully grew gross revenue by over 100% YoY for my business unit for 3 consecutive years• Managed 100+ clients focusing on cybersecurity-related projects, enhancing security resiliency • Developed multiple comprehensive post-exploitation frameworks for use during Red Team exercises• Experienced in creating clear and understandable technical documentation for all technical proficiency levels• United States Veteran, Special Operations Offensive Cyber Operator and Communicator • Seasoned Public Speaker, given multiple talks on offensive cybersecurity topics• Inaugural DEFCON trainer creating and facilitating a course on malware development to demystify it.• DEFCON Black Badge holder
-
Ceo And Emulated Mob Boss And Co-FounderEmulated CriminalsRaleigh, Nc, Us -
Hive Leader, North AmericaCovertswarm Jul 2024 - PresentLondon, Gb -
Co-Founder / Content CreatorThe Cyber Idiots Sep 2022 - PresentThe Cyber Idiots are a collective of curious minds eager to delve deeper into tech security and its far reaching arms. Embracing the idea that we're always learning, we believe in growing smarter each day. We undertake research projects and produce videos and talks, aiming to share our knowledge and insights with anyone keen on expanding their understanding of cybersecurity. -
Director, Offensive SecurityEchelon Risk + Cyber Apr 2021 - Jul 2024Pittsburgh, Pa, Us-Directs and manages all teams engaged in Offensive Security Services (Physical, Wireless, Internal, External), Social Engineering Exercises, Adversarial Emulation (Red Teaming), Purple Team activities, and Threat Hunting-Trusted Advisor to 100+ clients ranging from early-stage startups to Fortune 500 companies, helping identify risks and vulnerabilities hiding in plain sight -Service Delivery Lead for the Offensive Security service within Echelon Risk, offering services on Penetration Testing (Physical, Wireless, Internal, External), Cyber War Gaming, Social Engineering Exercises, Adversarial Emulation (Red Teaming), and Purple Team activities- vCISO helping clients transition from only remediating their hypothetical risk to realizing and remediating their practical and real risk in all aspects of the security domain. -Malware Development Instructor for internal and external trainings. Developed 48 hours of beginner and intermediate level trainings teaching malware development using C++ and Python3-"Chief Hacker" for all Echelon offensive cyber related R&D projects- Developed a kernel level shellcode loader for evading A/V detection for use on Echelon's Red Team engagements -
Cyber Risk Services / Red Team Specialist SeniorDeloitte Sep 2018 - Apr 2021Worldwide, Oo- Technical Manager of a small team providing Penetration Testing, Hardware Exploitation Testing, Application Exploitation Testing, Physical Security Testing, Red Team Exercises, and Purple Team Exercises as a managed service to a nationwide client. - Developed an in-memory post-exploitation framework within PowerShell, the framework could utilize any shellcode though its obfuscator which defeats 90% of tested Anti-Viruses- Established team member of the Deloitte Global Red Team, interconnecting multiple nation specific Member Firms to share new and improved methods of exploitation, obfuscation, and reporting- Discovered a Radio over IP Network Server 0-Day while performing a OT penetration test, the bug was immediately reported to the vendor and resolved- Conducted multiple Red Team exercises emulating attack vectors used by relevant threats to include insider threats, APTs, and nation state threat actors.- Lead a multinational team focusing on developing global strategic risk reduction activities for a client, establishing 24/7 support in an effort to reduce the external risk footprint- Utilized multiple obfuscation methods to prove that open source framework payloads from Metasploit and PowerShell Empire could be installed on a workstation while bypassing Antivirus detection - Conducted global reconnaissance of 150+ multinational partnered entities for the purpose of discovering external threats to the overall enterprise- Conducted multiple physical access and social engineering tests against clients' headquarter buildings and employees, exposing vulnerabilities to a client's network by using the human and physical elements to gain access. - Managed a python development team for the creation and management of an automation program and custom python module to be used with the RiskIQ platform, reducing time spent on required task from 120 man hours per week to 5 minutes per week -
Information Operations Security ResearcherJoint Communications Unit Jul 2016 - Oct 2018Fort Bragg, Nc, Us-Researched vulnerabilities using closed-source tools to discover cyber threats and security issues related to Operational Technology and Industrial Control assets-Led and conducted holistic security assessments for the purpose of determining remote vulnerabilities access across multiple network and end-user level devices utilizing custom python scripts and executables -Assisted in the research and development of a closed source proprietary network security tool suit for members of the DoD and its partner agencies.-Developed various Python, Bash, and PowerShell scripts for the use of exploitation during vulnerability testing-Utilized and managed end-user configurations of Red Hat Linux workstations, VMware vSphere clients, Cisco LAN/WAN technology, including packet level deconstruction using TCPdump and Wireshark.-Routinely briefed to both technical and non-technical audiences comprised of military commanders and civilian directors on mission capabilities, research projects, and development directions.-Liaison for Joint Special Operations Commands to other DoD agencies and several Intelligence agencies providing planning and coordination of special operation activities within the IT security domain. -Published detailed technical reports with executive summaries upon completion of all research projects for military commanders and their civilian counterparts.-Conducted real-world offensive cyber activities to assist in the find, fix, locate process of discovering High Value Targets in terrorist organizations. -Engineered a Data Loss Prevention plan utilizing GTB Technologies, Sonic Wall, and PFSense appliances protecting 2TB of sensitive data. -
Special Operations CommunicatorJoint Communications Unit Oct 2013 - Jul 2016Fort Bragg, Nc, Us-Installed, operated, and maintained Command, Control, Communications, Computers, and Intelligence systems on tactical, fixed, Airborne, and shipboard platforms for Special Operations Forces expeditionary operations.-Responsible for the operations and management of US Special Operations Commands rapid deployment platforms, including GigaSat satellites, Cisco network devices, Windows Servers, Harris radios, and various multicast devices for the purpose of providing intelligence video feeds into the network.-Conducted Defense Information Systems Agency compliance audits on Forward Operating Bases-Installed Super High Frequency, line-of-sight, Satellite, and LAN/WAN networks devices in support of US Special Operations Command directed missions-Prepared for and conducted no-notice special operations missions in support of emergency response directed by the US Special Operations Command. -Responsible for asset management of 587 items valued at $5 million comprised of network devices, servers, radio, and satellites-Tested and integrated new network, server, radio, and satellite technologies providing global interoperability to match special operations forces unique requirements. -
Enterprise System AdministratorUnited States Air Force Mar 2010 - Oct 2013Randolph Afb, Tx, Us-Managed and implemented security of a $650 million network spanning 13 time zones across 10 bases servicing 40K Command and Control systems across the Pacific Air Force-Operated and maintained $2.1 billion Air Force Network across 5 major enterprise networks comprised of 525 servers and 1.2M e-mail accounts-Performed e-mail sanitation to comply with the Freedom of Information Act-Served as Point of Contact for email warrants for the Air Force Office of Special Investigation in Hawaii-Led a team of 5 that conducted hardware and software upgrades for multiple Operating Systems on 350 Windows enterprise servers supporting 67K users.-Responsible for asset management of $1.1 million network and server equipment.-Managed and delivered core support for the Air Force network including enterprise messaging, mobile devices, wireless devices, and Anti-Virus solutions. -Wrote standard operating procedures and knowledge-based articles for deployment of Enterprise Exchange servers for the Air Force.-Managed and led a team of 5 administrators who migrated legacy 9K windows PCs and 13K legacy Active Directory objects into the new Air Force Network forest with 100% uptime.
Dahvid Schloss Skills
Frequently Asked Questions about Dahvid Schloss
What company does Dahvid Schloss work for?
Dahvid Schloss works for Emulated Criminals
What is Dahvid Schloss's role at the current company?
Dahvid Schloss's current role is CEO and Emulated Mob Boss and Co-Founder.
What is Dahvid Schloss's email address?
Dahvid Schloss's email address is da****@****ber.com
What are some of Dahvid Schloss's interests?
Dahvid Schloss has interest in Disaster And Humanitarian Relief, Science And Technology, Children, Education.
What skills is Dahvid Schloss known for?
Dahvid Schloss has skills like Cisco Routers, Microsoft Exchange, Active Directory, Information Security, Domain Name System, Satellite Communications, Python, Bash, Red Hat Linux, Cisco Ios, Powershell, Javase.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial