Eric Fleming

Eric Fleming Email and Phone Number

Security. Leader. Visionary. @ Synack, Inc.
Eric Fleming's Location
Canon City, Colorado, United States, United States
Eric Fleming's Contact Details

Eric Fleming work email

Eric Fleming personal email

n/a
About Eric Fleming

Eric Fleming is a Security. Leader. Visionary. at Synack, Inc..

Eric Fleming's Current Company Details
Synack, Inc.

Synack, Inc.

View
Security. Leader. Visionary.
Eric Fleming Work Experience Details
  • Synack, Inc.
    Sr. Cloud Security Engineer
    Synack, Inc. Apr 2021 - Present
    Redwood City, California, Us
    Implement processes and technologies that reduce cloud securitydeficiencies and help develop creative reporting mechanisms includingmetrics/key themes that communicate risk to business owners andleadership.Participate in development and implementation of, security design &architecture principles and standards, development and communicationof cloud security Standards and Training.Works closely with Lead Cloud Architects, Security Engineering,Infrastructure, Software engineering through our productimplementation lifecycle to design secure products, validate productdesigns and implementations against defined security controlsDevelop existing solutions and contribute to the development of newtechnical complex solutions by analyzing and identifying areas ofmodification and improvementConduct research to identify new attack vectors facing applications andcloud services.Serve as a core team member of the Security Design team.
  • By Light Professional It Services
    Cyber Training Operations Sme
    By Light Professional It Services Jun 2019 - Mar 2022
    Mclean, Virginia, Us
    Incorporate technical knowledge into training deliveryReplicate adversary tactics and techniques in cyber ranges utilizing KVM and SaltStack to orchestrate and emulate attacksDesign, develop cyber training related softwareDesign and develop relevant training curriculum
  • Presidio
    Principal Security Consultant
    Presidio Nov 2017 - Apr 2021
    New York, Ny, Us
    Conduct high risk and sensitive ethical hacks of internally and externally hosted applications globallySubject matter expert in web, mobile and network penetration testingPro-actively research and identify network and system vulnerabilities and provide recommended counter measures or mitigating controls to reduce riskProvide accurate and timely reporting of findings and proposed remediation and mitigationsAutomate deployment of attack infrastructure utilizing terraform on AWS services like EC2Actively involved in security research around new and emerging technologies
  • Network Telephone
    Network Operations Center Technician
    Network Telephone Sep 2000 - Mar 2021
    Test/Setup DSL Access-multiplexors (DSLAMS).Testing new telephony equipment.Monitored/Reported on/Troubleshot a five-state network.
  • University Of Colorado Boulder
    Adjunct Assistant Professor
    University Of Colorado Boulder Mar 2019 - Dec 2019
    Boulder, Colorado, Us
    TLEN 5830 Immersive Cyber Defense Teaching Assistant/Assistant ProfessorProvided hands-on demonstrations of exploitsTaught Threat-hunting skills and lessonsDemonstrated how to build your virtual lab with VirtualBox and VMWare
  • Circadence
    Senior Mission Director
    Circadence Nov 2017 - Jun 2019
    Boulder, Co, Us
    Provide guidance and mentorship to the design team on mission tools and scenario developmentActing team lead on several occasionsDesign, and develop cyber training-related softwareDevelop and test new tools and applications, emulating cyber adversaries, writing technical documentation, research anddevelopment and assisting with strategic planningUtilize ESXi and Azure to virtualize devicesReplicated adversary attacks and their TTPs in cyber ranges utilizing ESXi, Azure, docker, SaltStack
  • Root9B Llc
    Director, Network Defense Operations
    Root9B Llc May 2015 - Nov 2017
    Colorado Springs, Colorado, Us
    Provide guidance and mentorship to the analyst team on investigative and response methodologies.Research, develop, and keep abreast of tools, techniques, and process improvements in support of security detection and analysis in accordance with current and emerging threat and attack vectors.Drive pre-sales calls on prospective clients, participate in regional seminars and global webinars, and act as the technical manager for clients and channel partners.Managed, supervised, trained, and inspected a 20-member security team, as well as supplementary staff.Provided leadership for all incidents requiring security forces' response.Taught Linux, Exploitation, and Networking to DoD elements advanced cyber security techniquesCoordinated prioritization of alarms and priority resources for security force incident responses.
  • Root9B Llc
    Technical Director
    Root9B Llc May 2013 - May 2015
    Colorado Springs, Colorado, Us
    Help establish the company’s technical vision and lead all aspects of the company’s technological developmentWorks in a consultative fashion with other department headsProvides leadership to department heads in a fashion that supports the company’s cultureConducts research and case studies on leading-edge technologiesDeveloped course curriculum and TTPs for DoD elementsTaught Linux, Exploitation, and Networking to DoD elements advanced cyber security techniquesAssisted in developing cyber security policies
  • Mainnerve Llc
    Senior Cyber Security Engineer
    Mainnerve Llc Dec 2012 - May 2013
    Colorado Springs, Colorado, Us
    Develop software programs, including software tools and computer network attack tools.Acting Red Team LeadPerform research and development/engineering for IS or IT-related efforts.Served as SME in cyber operations exploitation development.Streamline curriculum development process.Developed TTPs on increasing digital covert operations.
  • Nek Advanced Securities Group, Inc.
    Senior Developer
    Nek Advanced Securities Group, Inc. Jan 2011 - Dec 2012
    Us
    Develop software programs, including software tools and computer network attack tools.Perform research and development/engineering for IS or IT-related efforts.Direct and supervise staff in the development of computer software initiatives.Served as SME in cyber operations exploitation development.Streamline curriculum development process.Developed classes on Linux, Buffer Overflows, Scanning & Enumeration, Networking, Bash Shell Scripting.Developed techniques for increasing digital covert operations.
  • Nek Advanced Securities Group, Inc.
    Cyber Operations Technician
    Nek Advanced Securities Group, Inc. Jul 2009 - Dec 2010
    Us
    Perform full spectrum computer network operations (security assessments) that include the collection, processing, preservation, analysis, exploitation, and presentation of computer-related intelligence.Develop training materials & conduct training classes in support of tailored client requirements in support of unique asymmetric operations intended for Special Operations, Law Enforcement, Homeland Security, Counterintelligence (CI), Human Intelligence (HUMINT) and Signals Intelligence (SIGINT) personnel conducting counterterrorism operations, force protection activities, interrogations, and criminal investigations.Develop training mechanisms that address basic personal cyber security concepts; apply knowledge of network fundamentals, open-source tools, and current implementation of those technologies in order to devise all-source analytic/collection strategies to pursue access and exploitation of targets of interest.Conduct analysis of computer networking devices utilizing experience & knowledge of a wide variety of advanced computer networking technologies.
  • Us Army
    Senior Army Computer Network Operations (Cno) Operator
    Us Army Oct 2005 - Aug 2009
    Arlington, Virginia, Us
    One of three certified Journeyman level CNE operators with a specific skill set, as well as a Journeyman in an additional specialty.Responsible for the security and usage of multimillion-dollar government tools and infrastructure.Train operators at all levels of Service and Joint Computer Network Warfare (CNW).Designed the Job Qualification Standard (JQS) used by NSA and the US Army to document the training process of newly assigned CNO operators.Conducted CNO operations on computer and network platforms as part of the CNO effort within the National Security Agency (NSA).
  • Us Army
    Current Operations Support Team Ncoic
    Us Army Sep 2004 - Sep 2005
    Arlington, Virginia, Us
    Supervise eleven Soldiers.Conducted weekly commander’s update briefs.Assisted in planning of Mobile Training Teams.Assistant Platoon Sergeant of 63 Soldiers.
  • Us Army
    Army Technical Control And Analysis Element (Atcae) System Administrator
    Us Army Sep 2004 - Sep 2005
    Arlington, Virginia, Us
    Webmaster of both NSA and JWICS websites.Solaris System Administrator.Windows 2000 System Administrator.Developed web applications to help automate the ATCAE’s Operations.
  • Us Army
    Regional Technical Control And Analysis Element (Rtcae) System Administrator
    Us Army Mar 2001 - Sep 2004
    Arlington, Virginia, Us
    Webmaster of both NSA and JWICS websites.Developed web applications to aid in intelligence dissemination.Wrote shell scripts aiding in reporting productivity.Solaris system administration.
  • Eagle Alliance
    Information Security Professional
    Eagle Alliance Nov 2007 - Jun 2009
    Falls Church, Va, Us
    Focal point for reporting suspected exploitation of vulnerabilities, computer viruses, and unexplained anomalies affecting information systems.Provide quick informed and intelligent responses to unexpected changes in the security health of the Agency’s communications system.Provide direct input on the technical and security health of the Agency’s systems to the Senior Operations Officer to aid in mission decisions.Analyze and interpret technical data via the Intrusion Detection Systems (IDS) tools. Key member of a team that identifies Cyberterrorism, Hacker Attacks, Information Warfare, Computer Network Exploitation (CNE), Virus Outbreaks, System Compromises, Information Operations,Computer Network Defense (CND).
  • Gulf Coast Internet
    Technical Support
    Gulf Coast Internet Jun 1999 - Sep 2000
    Provided support to dial-up, DSL, and T1 customers.Trained employees on a weekly basis on basic troubleshooting.Administrated FreeBSD dial-up servers.PBX Administration.Developed tracking database for technical issues.

Eric Fleming Education Details

  • Colorado Technical University
    Colorado Technical University

Frequently Asked Questions about Eric Fleming

What company does Eric Fleming work for?

Eric Fleming works for Synack, Inc.

What is Eric Fleming's role at the current company?

Eric Fleming's current role is Security. Leader. Visionary..

What is Eric Fleming's email address?

Eric Fleming's email address is er****@****ack.com

What schools did Eric Fleming attend?

Eric Fleming attended Colorado Technical University.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.