David Mashburn Email and Phone Number
David Mashburn work email
- Valid
- Valid
David Mashburn personal email
- Valid
David Mashburn phone numbers
An experienced information technology security professional, certified as GSE #157, with significant experience in different technical domains, including systems administration, database design and administration, information and network security, and software development.Scheduled teaching engagementsSANS Conferences: https://www.sans.org/instructors/david-mashburnCommercial tools: Splunk, Check Point, Palo Alto, McAfee ePO, Nessus, Nexpose, Carbon Black, ZscalerOpen source tools: Snort, Wireshark, tshark, tcpdump, nmap, Zeek (Bro), Security Onion, Elastic stackSecurity tools: Metasploit framework, recon-ng, Burp suite, ZAPDatabases: SQL Server, MySQL, SQLiteScripting: Python, Bash, PowershellOperating systems: Linux (Red Hat and Debian-based), WindowsAny posts reflect my own views and not those of any employer.
Embry-Riddle Aeronautical University
View-
Chief Information Security OfficerEmbry-Riddle Aeronautical University Jun 2021 - PresentDaytona Beach, Florida, Us -
Incident ManagerSalesforce Aug 2020 - May 2021San Francisco, California, Us -
Principal ConsultantD3Ks Enterprises Jan 2018 - Aug 2020Information Security consulting services focused on security operations and systems monitoring.
-
It Security ManagerU.S. Pharmacopeia Feb 2012 - Aug 2019Rockville, Maryland, UsHands-on IT Security professional providing operational security and support for a global non-profit organization. In addition to technical duties, responsible for the development and implementation of the IT security program for the organization along with associated policies and procedures to support the mission of USP.Key duties and accomplishments:- Implementation of a SOC with related policies and procedures- Growth of the security team to support organizational objectives- Log analysis and review- Firewall policy management and maintenance- Internal web application security assessments- Vulnerability scanning and remediation- Threat and risk assessment- Security incident responseIn addition to the hands-on technical duties, other responsibilities include:- Serve on the Enterprise Architecture committee- Security reviews of projects, SaaS offerings, and new systems- Development and maintenance of security policies- Improved visibility of network activity through deployment of additional instrumentation- Assessing and monitoring PCI complianceKey projects:- Refresh and update of endpoint and IDS solutions- Deployment of Splunk and development of custom dashboards and alerts- Design and deployment of SAML-based single-sign on (SSO) solution- Migration and upgrade of firewall solution from legacy platform- Internal segmentation of network and hardening of endpoints- Deployment of new systems and security controls to improve visibility within the environment- Internal security assessments -
Adjunct FacultyUniversity Of Maryland University College Jun 2012 - Jul 2016Adelphi, Maryland, UsPart-time Assistant Adjunct Professor teaching various courses in Cybersecurity topics.Previous coursesSummer 2016 US session OL1: CMIT321 - Ethical Hacking [Section 6380]Spring 2016 US session OL4: CMIT321 - Ethical Hacking [Section 7987]Spring 2016 US session US1: CMIT321 - Ethical Hacking [Section 5125]Fall 2015 US session US2: CMIT321 - Ethical Hacking [Section 5155]Fall 2015 US session US1: CMIT 321 - Ethical Hacking [Section 5120]Spring 2015 US session US2: CMIT 321 - Ethical Hacking [Section 5160]Spring 2015 US session US1: CMIT 321 - Ethical Hacking [Section 5115]Fall 2014 US session US2: CMIT 321 - Ethical Hacking [Section 5150]Fall 2014 US session US1: CMIT 321 - Ethical Hacking [Section 5115]Spring 2014 US session US2: CMIT 321 - Ethical Hacking [Section 7982]Spring 2014 US session US1: CMIT 321 - Ethical Hacking [Section 5120]Fall 2013 US session US2: CMIT 321 - Ethical Hacking [Section 5160]Fall 2013 US session US1: CMIT 321 - Ethical Hacking [Section 5125]Summer 2013 session US1: CMIT 321 - Ethical Hacking [Section 5120]Spring 2013 session US2: CMIT 321 - Ethical Hacking [Section 5155]Fall 2012 session OL4: CSIA 413 - Security Policy [Section 7982] -
Cyber Security Team LeadRolling Bay Llc Aug 2010 - Feb 2012Hands-on team lead for IT security for a program office in a civilian Federal agency. Responsible for operational security, including ongoing vulnerability scanning, log review and analysis, security-related auditing, and operating the IPS, as well as for compliance activities such as Certification and Accreditation activities and FISMA reporting.Duties and notable projects:- Technical lead for project to test and deploy Windows 7 across the supported environment.- Directed and conducted patching efforts using tools such as SCCM and WSUS.- Conducted assessments of FDCC and baseline configuration compliance.- Performed vulnerability scanning and threat assessment to the environment.- Provided incident response and escalation as required within the environment.- Conducted regular training and professional development activities for the Cyber team.- Conducted certification and accreditation (C&A) of systems to assess compliance with FISMA, FISCAM, and Department standards.- Provided support as required to other operational areas, serving as a technical subject matter expert for issues in the SQL and Windows environment.
-
Technical ManagerHill Associates Mar 2009 - May 2011Performed multiple security-related duties for a civilian Federal agency. Duties ranged from auditing of network devices to incident response to supporting the security operations center (SOC). Developed tools to assist in the automation of the audit process and to provide accurate mapping of endpoints and network locations. Deployed and utilized OPNET for traffic analysis across the WAN, and performed traffic and application analysis for customers with the tools.In addition to technical duties, assisted with certification and accreditation activities for the systems. Mapped security controls for systems to the NIST SP800-53 controls and assessed compliance with FISMA requirements.
-
Senior Java DeveloperPremier, Inc. Feb 2006 - Mar 2009Charlotte, Nc, UsPremier acquired Cereplex, Inc. in September 2006. Prior to acquisition I served as the Technical Operations Manager for Cereplex.Cereplex was an early-stage company in the health-care arena, focused primarily on infection control. As part of the technical team was responsbile for multiple areas, including systems, security, software development, and database administration. Operational responsibilities- Server deployment and patching- Upgrade from legacy NT domain to Active Directory forest- Monitoring of servers and services for availabilitySecurity responsibilities- Implemented internal security controls for HIPAA and ISO 17799 compliance- Developed security policies and procedures- Managed and maintain firewall- Assessed design of new products for security compliance- Validation of security practices by partnersSoftware and database development- Developed complex queries and stored procedures to extract data from health records for presentation in the web application- Tuned SQL database for performance- Scripted deployment of database objects from source code repository to automate build process- Developed internal application based on open source components to replace commercial reporting application.- Ported existing web application from legacy platform to C#. -
It ManagerQbit, Llc Feb 2005 - Jan 2006UsPerformed both technical and managerial duties for this pre-revenue scientific research start-up. - Supported a mixed Windows, Solaris, Linux, and Mac environment for research scientists and software developers.- Managed security for the enterprise, including firewall management and configuration, as well as handling networking and telecom issues.- Provided hands-on technical support and implementation in addition to the supervision of outside contractors.- Forecast and budgeted for technology needs aligned with business objectives.- Handled all technology-related purchasing.- Implemented SAN solution for Windows and Solaris environments.- Re-architected the network infrastructure, including new IP addressing scheme and routing.- Developed of a relational SQL database for capturing benchmarking test results for the software products. -
It ManagerThe Ballenger Group, Llc Apr 2002 - Apr 2005
-
It ManagerPrime Financial Group Jun 2001 - Apr 2002
-
It ManagerAyb Jun 2000 - Jun 2001
David Mashburn Skills
David Mashburn Education Details
-
The Johns Hopkins UniversityComputer Science -
University Of MarylandKinesiology
Frequently Asked Questions about David Mashburn
What company does David Mashburn work for?
David Mashburn works for Embry-Riddle Aeronautical University
What is David Mashburn's role at the current company?
David Mashburn's current role is Chief Information Security Officer at Embry-Riddle Aeronautical University and SANS Certified Instructor.
What is David Mashburn's email address?
David Mashburn's email address is d.****@****ail.com
What is David Mashburn's direct phone number?
David Mashburn's direct phone number is +1.301.881*****
What schools did David Mashburn attend?
David Mashburn attended The Johns Hopkins University, University Of Maryland.
What skills is David Mashburn known for?
David Mashburn has skills like Computer Security, Security, Network Security, Information Security, Firewalls, Cissp, Penetration Testing, System Administration, Networking, Linux, Security Policy, Network Administration.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial