Dan King Email and Phone Number
Dan King work email
- Valid
- Valid
- Valid
Dan King personal email
- Valid
- Valid
- Valid
SPEAKING ENGAGEMENTS:BlackHat USA 2010:The Emperor Has No Clothes: Insecurities in Security Infrastructurehttp://www.blackhat.com/html/bh-us-10/bh-us-10-archives.html#FeinsteinSpecialties: Metasploit, Buffer Overflows, SQL Injection, Remote File Include, Vulnerability Management, Vulnerability discovery, finding configuration security issues
Scorpion Labs By K Logix
View- Website:
- klogixsecurity.com
- Employees:
- 45
-
Principal Security ConsultantScorpion Labs By K LogixBoston, Ma, Us -
Principal Security ConsultantScorpion Labs By K Logix May 2023 - Present -
Principal ConsultantK Logix Jan 2021 - PresentBrookline, Massachusetts, Us -
Principal ConsultantNcc Group Jun 2020 - Jan 2021Manchester, Greater Manchester, Gb -
Senior Security ConsultantNcc Group Jun 2015 - Jun 2020Manchester, Greater Manchester, Gb -
ConsultantIoactive, Inc. Apr 2013 - Jun 2015Seattle, Washington, Us*Conducted external and internal vulnerability assessments and analysis using tools such as Metasploit, Nessus and nmap as well as manual testing*Performed manual and automated web application penetration testing for large scale deployments using custom written scripts and Burp Suite framework*Network penetration testing for medium and large networks leading to full compromise of critical assets *Exfiltration of sensitive data bypassing security controls *Performed password analysis by using hash various cracking techniques including GPU brute force, wordlist generation, and mangling*Ran physical penetration attacks which have lead to compromise of devices such as ATM machines and access to sensitive areas within buildings (data centers, key personnel offices)*Executed penetration tests and research against medical devices including but not limited to MRI machines, infusion pumps, and CT scanners which have lead to zero day vulnerabilities which are unpublished due to NDA*Worked with clients to deliver exceptional reports and documentation of all security findings*Executed social engineering attacks including physical intrusion as well as phishing, malicious media and telephone attacks.*Reverse engineered Microsoft Windows applications looking for security vulnerabilities*Performing security assessments on iOS and Android applications *Ran PCI ASV quarterly scans for clients -
Senior Security ConsultantNwn Corporation Apr 2012 - Apr 2013Boston, Massachusetts, UsIdentified and exploited vulnerabilities within but not limited to: network services, web applications, wireless networks, and physical security controlsInvestigated new and evolving threatsDocumented highly technical information in comprehensible formWorked independently and met all deadlinesWork in partnership with clients to formulate action plans and deliver feedbackPassionately studied offensive security skills and techniques to improve skill setResearched ways users develop passwords -
Network Security Senior AdvisorDell Secureworks Jul 2008 - Apr 2012* Designed and Executed web application scanning service using Qualys Web Application Scanning platform* Responsible for vulnerability management using Qualys, Nexpose and Nessus* Demonstrated and verified vulnerabilities using the Metasploit Framework* Routinely executed web application penetration tests using Burp Suite, AppScan and manual testing techniques* Executed PCI scans as an Approved Scanning Vendor (ASV) certified auditor* Conducted penetration tests against internal security infrastructure including firewalls, IPS devices and management consoles.* Researched public exploits and engineered them to ensure execution in various environments * Uncovered software flaws using fuzzing techniques in popular document formats* Compiled data into custom reports for clients illustrating vulnerabilities in their infrastructure
-
Support EngineerVerisign Mar 2006 - Jul 2008* Designed and implemented automatic signature deployment for Cisco IDS with custom Perl scripts* Managed Dragon IDS and deployed sensors for very large environments* Examined and modified IDS/IPS signatures to lower false positive rates
-
Security AnalystVerisign Mar 2004 - Mar 2006* Worked with Fortune 500 clients on complex issues in very large networks* Analyzed IDS alerts to detect network compromise attempts* Escalated serious security incidents to clients and worked with them to gather intelligence* Verified accuracy of IDS alerts by doing manual packet inspection
Dan King Skills
Dan King Education Details
-
Southern New Hampshire UniversityBusiness Administration With Concentration In Organizational Leadership -
Westfield High SchoolDiploma
Frequently Asked Questions about Dan King
What company does Dan King work for?
Dan King works for Scorpion Labs By K Logix
What is Dan King's role at the current company?
Dan King's current role is Principal Security Consultant.
What is Dan King's email address?
Dan King's email address is ra****@****ail.com
What schools did Dan King attend?
Dan King attended Southern New Hampshire University, Westfield High School.
What skills is Dan King known for?
Dan King has skills like Vulnerability Scanning, Vulnerability Discovery, Network And Web Penetration Testing, Vulnerability Management, Penetration Testing, Intrusion Detection, Ids, Computer Security, Network Security, Vulnerability, Metasploit, Ethical Hacking.
Who are Dan King's colleagues?
Dan King's colleagues are Sydney Solomon, Nancy Quispe Delgado, Kristin Jones, Garrett Mccarthy, Roger Vann, Ramanjaneya Gantasala, Brian R..
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial