Eric Fleming work email
- Valid
Eric Fleming personal email
Eric Fleming is a Security. Leader. Visionary. at Synack, Inc..
-
Sr. Cloud Security EngineerSynack, Inc. Apr 2021 - PresentRedwood City, California, UsImplement processes and technologies that reduce cloud securitydeficiencies and help develop creative reporting mechanisms includingmetrics/key themes that communicate risk to business owners andleadership.Participate in development and implementation of, security design &architecture principles and standards, development and communicationof cloud security Standards and Training.Works closely with Lead Cloud Architects, Security Engineering,Infrastructure, Software engineering through our productimplementation lifecycle to design secure products, validate productdesigns and implementations against defined security controlsDevelop existing solutions and contribute to the development of newtechnical complex solutions by analyzing and identifying areas ofmodification and improvementConduct research to identify new attack vectors facing applications andcloud services.Serve as a core team member of the Security Design team. -
Cyber Training Operations SmeBy Light Professional It Services Jun 2019 - Mar 2022Mclean, Virginia, UsIncorporate technical knowledge into training deliveryReplicate adversary tactics and techniques in cyber ranges utilizing KVM and SaltStack to orchestrate and emulate attacksDesign, develop cyber training related softwareDesign and develop relevant training curriculum -
Principal Security ConsultantPresidio Nov 2017 - Apr 2021New York, Ny, UsConduct high risk and sensitive ethical hacks of internally and externally hosted applications globallySubject matter expert in web, mobile and network penetration testingPro-actively research and identify network and system vulnerabilities and provide recommended counter measures or mitigating controls to reduce riskProvide accurate and timely reporting of findings and proposed remediation and mitigationsAutomate deployment of attack infrastructure utilizing terraform on AWS services like EC2Actively involved in security research around new and emerging technologies -
Network Operations Center TechnicianNetwork Telephone Sep 2000 - Mar 2021Test/Setup DSL Access-multiplexors (DSLAMS).Testing new telephony equipment.Monitored/Reported on/Troubleshot a five-state network.
-
Adjunct Assistant ProfessorUniversity Of Colorado Boulder Mar 2019 - Dec 2019Boulder, Colorado, UsTLEN 5830 Immersive Cyber Defense Teaching Assistant/Assistant ProfessorProvided hands-on demonstrations of exploitsTaught Threat-hunting skills and lessonsDemonstrated how to build your virtual lab with VirtualBox and VMWare -
Senior Mission DirectorCircadence Nov 2017 - Jun 2019Boulder, Co, UsProvide guidance and mentorship to the design team on mission tools and scenario developmentActing team lead on several occasionsDesign, and develop cyber training-related softwareDevelop and test new tools and applications, emulating cyber adversaries, writing technical documentation, research anddevelopment and assisting with strategic planningUtilize ESXi and Azure to virtualize devicesReplicated adversary attacks and their TTPs in cyber ranges utilizing ESXi, Azure, docker, SaltStack -
Director, Network Defense OperationsRoot9B Llc May 2015 - Nov 2017Colorado Springs, Colorado, UsProvide guidance and mentorship to the analyst team on investigative and response methodologies.Research, develop, and keep abreast of tools, techniques, and process improvements in support of security detection and analysis in accordance with current and emerging threat and attack vectors.Drive pre-sales calls on prospective clients, participate in regional seminars and global webinars, and act as the technical manager for clients and channel partners.Managed, supervised, trained, and inspected a 20-member security team, as well as supplementary staff.Provided leadership for all incidents requiring security forces' response.Taught Linux, Exploitation, and Networking to DoD elements advanced cyber security techniquesCoordinated prioritization of alarms and priority resources for security force incident responses. -
Technical DirectorRoot9B Llc May 2013 - May 2015Colorado Springs, Colorado, UsHelp establish the company’s technical vision and lead all aspects of the company’s technological developmentWorks in a consultative fashion with other department headsProvides leadership to department heads in a fashion that supports the company’s cultureConducts research and case studies on leading-edge technologiesDeveloped course curriculum and TTPs for DoD elementsTaught Linux, Exploitation, and Networking to DoD elements advanced cyber security techniquesAssisted in developing cyber security policies -
Senior Cyber Security EngineerMainnerve Llc Dec 2012 - May 2013Colorado Springs, Colorado, UsDevelop software programs, including software tools and computer network attack tools.Acting Red Team LeadPerform research and development/engineering for IS or IT-related efforts.Served as SME in cyber operations exploitation development.Streamline curriculum development process.Developed TTPs on increasing digital covert operations. -
Senior DeveloperNek Advanced Securities Group, Inc. Jan 2011 - Dec 2012UsDevelop software programs, including software tools and computer network attack tools.Perform research and development/engineering for IS or IT-related efforts.Direct and supervise staff in the development of computer software initiatives.Served as SME in cyber operations exploitation development.Streamline curriculum development process.Developed classes on Linux, Buffer Overflows, Scanning & Enumeration, Networking, Bash Shell Scripting.Developed techniques for increasing digital covert operations. -
Cyber Operations TechnicianNek Advanced Securities Group, Inc. Jul 2009 - Dec 2010UsPerform full spectrum computer network operations (security assessments) that include the collection, processing, preservation, analysis, exploitation, and presentation of computer-related intelligence.Develop training materials & conduct training classes in support of tailored client requirements in support of unique asymmetric operations intended for Special Operations, Law Enforcement, Homeland Security, Counterintelligence (CI), Human Intelligence (HUMINT) and Signals Intelligence (SIGINT) personnel conducting counterterrorism operations, force protection activities, interrogations, and criminal investigations.Develop training mechanisms that address basic personal cyber security concepts; apply knowledge of network fundamentals, open-source tools, and current implementation of those technologies in order to devise all-source analytic/collection strategies to pursue access and exploitation of targets of interest.Conduct analysis of computer networking devices utilizing experience & knowledge of a wide variety of advanced computer networking technologies. -
Senior Army Computer Network Operations (Cno) OperatorUs Army Oct 2005 - Aug 2009Arlington, Virginia, UsOne of three certified Journeyman level CNE operators with a specific skill set, as well as a Journeyman in an additional specialty.Responsible for the security and usage of multimillion-dollar government tools and infrastructure.Train operators at all levels of Service and Joint Computer Network Warfare (CNW).Designed the Job Qualification Standard (JQS) used by NSA and the US Army to document the training process of newly assigned CNO operators.Conducted CNO operations on computer and network platforms as part of the CNO effort within the National Security Agency (NSA). -
Current Operations Support Team NcoicUs Army Sep 2004 - Sep 2005Arlington, Virginia, UsSupervise eleven Soldiers.Conducted weekly commander’s update briefs.Assisted in planning of Mobile Training Teams.Assistant Platoon Sergeant of 63 Soldiers. -
Army Technical Control And Analysis Element (Atcae) System AdministratorUs Army Sep 2004 - Sep 2005Arlington, Virginia, UsWebmaster of both NSA and JWICS websites.Solaris System Administrator.Windows 2000 System Administrator.Developed web applications to help automate the ATCAE’s Operations. -
Regional Technical Control And Analysis Element (Rtcae) System AdministratorUs Army Mar 2001 - Sep 2004Arlington, Virginia, UsWebmaster of both NSA and JWICS websites.Developed web applications to aid in intelligence dissemination.Wrote shell scripts aiding in reporting productivity.Solaris system administration. -
Information Security ProfessionalEagle Alliance Nov 2007 - Jun 2009Falls Church, Va, UsFocal point for reporting suspected exploitation of vulnerabilities, computer viruses, and unexplained anomalies affecting information systems.Provide quick informed and intelligent responses to unexpected changes in the security health of the Agency’s communications system.Provide direct input on the technical and security health of the Agency’s systems to the Senior Operations Officer to aid in mission decisions.Analyze and interpret technical data via the Intrusion Detection Systems (IDS) tools. Key member of a team that identifies Cyberterrorism, Hacker Attacks, Information Warfare, Computer Network Exploitation (CNE), Virus Outbreaks, System Compromises, Information Operations,Computer Network Defense (CND). -
Technical SupportGulf Coast Internet Jun 1999 - Sep 2000Provided support to dial-up, DSL, and T1 customers.Trained employees on a weekly basis on basic troubleshooting.Administrated FreeBSD dial-up servers.PBX Administration.Developed tracking database for technical issues.
Eric Fleming Education Details
-
Colorado Technical University
Frequently Asked Questions about Eric Fleming
What company does Eric Fleming work for?
Eric Fleming works for Synack, Inc.
What is Eric Fleming's role at the current company?
Eric Fleming's current role is Security. Leader. Visionary..
What is Eric Fleming's email address?
Eric Fleming's email address is er****@****ack.com
What schools did Eric Fleming attend?
Eric Fleming attended Colorado Technical University.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial