Gilberto De Leon Email and Phone Number
Gilberto De Leon work email
- Valid
Gilberto De Leon personal email
As a Product Security Engineer at LTK, a leading influencer marketing platform, I have over ten years of experience in cyber security, a Master's degree in Digital Forensics, and certifications in Ethical Hacking and Cloud. My mission is to design, implement, and manage security controls and architectures that protect LTK's products from threats and ensure compliance with industry standards and regulations.I collaborate with development teams to conduct comprehensive risk assessments, analyze potential threats, and recommend and implement countermeasures. I also leverage tools such as Wiz, Snyk, and OWASP ThreatDragon to address vulnerabilities, and non-compliant configurations. I am passionate about staying up to date with the latest trends and technologies in cyber security and applying them to enhance LTK's product security and customer trust.
Ltk
View- Website:
- company.shopltk.com
- Employees:
- 1009
-
Staff Security Engineer | Product SecurityLtkLand O' Lakes, Fl, Us -
Product Security EngineerLtk Aug 2023 - PresentDallas, Tx, UsSecurity Design & Architecture:•Collaborating with development teams to design security controls and architectures that protect against threats.•Implementing security best practices across the product lifecycle.Risk Analysis & Management:•Conducting comprehensive risk assessments on products to identify vulnerabilities.•Implementing risk mitigation strategies and tracking their effectiveness.Threat Modeling & Analysis:•Analyzing potential threats to products and developing threat models.•Recommending and implementing countermeasures to mitigate risks.Compliance & Regulation Alignment:•Ensuring all products meet industry standards and regulatory compliance requirements.•Coordinating with legal and compliance teams to ensure alignment with regional and global regulations.Security Testing & Validation:•Leading penetration testing and security validation efforts.•Collaborating with quality assurance teams to ensure security features are properly tested.Secure Code Training:•Developing and delivering security training for internal teams.•Promoting security awareness across the organization.Vendor & Third-Party Security Management:•Assessing and managing security risks related to third-party vendors.•Collaborating with procurement teams to ensure security is considered in vendor selection.Continuous Improvement:•Participating in security research and staying abreast of the latest security trends and technologies.•Driving continuous improvement initiatives to enhance the organization's security posture. -
Threat & Vulnerability | Secops | Appsec ManagerLtk Mar 2022 - Aug 2023Dallas, Tx, Us•Execute a vulnerability management strategy across LTK environments including SaaS, PaaS, & IaaS.•Track new and emerging threats to LTK environments.• Provide leadership, mentoring, and continuing education to a team of highly motivated and highly skilled security professionals.•Maturing security processes, increasing automation, and decreasing response times to remediating discovered non-compliant configurations and indicators of compromise.•Perform initial and periodic security assessments for incidents and conducts related ongoing investigation activities in coordination with other corporate functions• Establish security-focused training and hackathons to raise developer awareness of security best practices.•Performe Red Team, Blue Team, and Threat simulations to enhance overall security posture.•Provide continues support as a thought leader for the organization. -
Senior Security EngineerRed Ventures Jan 2021 - Mar 2022Fort Mill, Sc, Us•Assist in the design, evaluation, and implementation of new security technologies for our cloud infrastructure.•Analyzes and recommend security controls and procedures in acquisitions, migrations.•Research, analysis, and response for alerts; including log retrieval and documentation. Responds to security incidents as needed.•Conduct analysis of network traffic and host activity across a wide array of technologies and platforms•Design and build custom tools for investigations, hunting, and research•Provide Threat Intelligence trends, with respect to organizational risk; advises management/business verticals on executing plans for mitigation of risk; performs risk and security assessments and engages and coordinates third-party risk and compliance assessments.•Assist in the continued developments for our security governance, including organizational policies, procedures, standards, baselines and guidelines with respect to both regulatory and compliance requirements. -
Cyber Security Incident ResponderNielsen Feb 2019 - Oct 2020New York, Ny, Us• Analyze data, perform research, and verify information for potential misconduct or abnormal behavior.• Analyze data feeds for event detection, and perform correlation analysis on data from multiple monitoring sources.• Respond to cybersecurity events and incidents caused by internal and external threats to our systems, coordinate response activities with various stakeholders for confirmed incidents, and recommend mitigation strategies.• Proactively hunt for adversaries on our networks utilizing a variety of tools and techniques• Triage emerging threats to protect assets and information in the environment.• Produce forensic imaging and coordinate evidence collection for investigations.• Utilize data mining tools to collect, search, sort, and organize large amounts of information.• Research, address, and resolve data loss prevention (DLP), virus alerts, and other security-related events.• Partner with cross-functional technical teams to share expertise, research threats, and implement solutions.• Produce reports, communications and other forms of communication that may be both internal and to include leadership and executive management.• Draft root cause analysis reports and recommendations after cybersecurity incidents.• Identify risk areas that will require vulnerability prevention• Stay current with Security technologies and make recommendations for use based on business value -
Team Lead/ Network Penetration TesterThe Depository Trust & Clearing Corporation (Dtcc) Apr 2016 - Feb 2019Jersey City, Nj, UsDevelop pentest plan in collaboration with stakeholders from Business Units covering the following areas:•Vulnerability assessments•Network penetration testing•Social engineering testing•Lead and execute red team/blue team operations with Global SOC resources•Lead pentester resources from each region•Manage third party that will be performing independent vulnerability or red team assessments methodology•Develop red team methodologies including tactics, techniques and procedures.•Build and maintain cyber arsenal for use in target agreed-upon mission.•Evaluate new measures, tools and technology to deliver red team operation with department.•Regularly consult with the IR/ Intel team to share on emerging threats and TTPs and recommend improvement.•Recommend improvements on controls to help better protect systems and network.•Management Reporting•Approve network penetration testing reports.•Report to management on risks and proposed countermeasure.•Participate in innovation projects & technology evaluation, deployment, build, define advanced threat process and best practices.•Provide advanced threat awareness and education to members of the team.•Assists and mentor a diverse team of analysts. -
Cyber Threat AnalystThe Depository Trust & Clearing Corporation (Dtcc) Aug 2015 - Apr 2016Jersey City, Nj, Us•Manage and maintain threat intelligence feeds and threat sources for correlation of threat communication information•Support identification of data for data-mining, statistical and security threat analysis•Document custom report formats, event types, and specific finger printing requirements for use in security alerting and remediation workflow.•Respond to escalations from incident response team to provide technical expertise by coordination with appropriate external vendor support.•Analyzing security logs, monitoring logs, firewall logs, intrusion prevention system logs, and network- and core-related logs.•Perform digital forensics of both network and desktop environments•Daily monitoring and maintenance of custome DLP systems, and other relative monitoring tools.•Perform and review DLP policy, workflow and system settings following established DLP change process with the assistance of operational tools and resources. -
It Security AnalystThe Depository Trust & Clearing Corporation (Dtcc) Apr 2015 - Aug 2015Jersey City, Nj, Us•Provide support for Data Loss Prevention (DLP) platform including analysis and implementation of data loss prevention requirements.•Familiar with regulatory requirements (PCI, SOX, etc)•Document custom report formats, event types, and specific finger printing requirements for use in security alerting and remediation workflow.•Respond to escalations from incident response team to provide technical expertise by coordination with appropriate external vendor support.•Daily monitoring and maintenance of custome DLP systems, and other relative monitoring tools.•Perform and review DLP policy, workflow and system settings following established DLP change process with the assistance of operational tools and resources.•Work within the DTCC incident response system to document events and incidents. •Work with Interfacing with CIS staff to tune and build Vontu policies. -
Military PoliceUs Army Nov 2004 - Aug 2016Arlington, Virginia, UsLaw Enforcement, Investigations, Combat Ops -
It Security AnalystSecurity Compliance Associates Aug 2015 - Aug 2015Clearwater, Fl, Us• Assist clients with questions regarding vulnerabilities and propose mitigations: • Write clear, detailed assessment reports • Perform port scanning of small and large networks • Perform vulnerability scanning on systems and applications • Assess mobile & online applications for vulnerabilities • Find/Identify web application vulnerabilities such as cross-site scripting and directory traversal • Perform wireless vulnerability assessments, including access point detection and WEP cracking • Password cracking, assessing strength of passwords hashes ,Generate custom doc/pdf files that tests for the existence of a vulnerability • Perform research, analysis and testing of network and application vulnerabilities -
It AnalystRaymond James Financial Inc. Feb 2014 - Apr 2015St. Petersburg, Florida, UsTSR:•Assistance with logins, passwords, and RSA Secure Access tokens•Assistance with basic troubleshooting and resolution of common errors and known issues•Support with basic how-to assistance for PCs and applications•Aid users with basic installations and configurations, such as drivers, printers, Advisor's Resource Console, and Outlook•Assistance requesting new services, applications, or hardware•Coordination of IT service requests, including status updates and escalation -
It Support SpecialistHewlett-Packard Oct 2013 - Jan 2014Houston, Texas, UsTraveling CSR Technician· team goes out to different military bases and installs computers, upgrades machines, handles deployments, ghost's machines, upgrades networks that are out of date. · Monitor, operate and maintain hardware, software, and networks for a computing platform for all military installations supported by NMCI (Navy Marine Corps Intranet) · Configure, assemble and install laptops, microcomputers, workstations and/or peripheral equipment. · Perform first line support for service interruptions such as printer routing, power outages, wiring problems, and malfunctioning servers and escalate unresolved problems to expedite resolution.· Upgrade, modify and replace hardware, software and network components. -
It Support TechnicianVivjer Computers Jun 2013 - Oct 2013Repair, build PC, laptop, servers, apple computers, and consult consumers as far as their business needsNetworking – Routers, Switches, Firewall, Wireless, IP TelephonyDisaster Recovery PlanningSecurity testing and fortificationIT Audits
Gilberto De Leon Skills
Gilberto De Leon Education Details
-
University Of South FloridaMasters In Digital Forensics -
Keiser University-Ft LauderdaleBachelor Of Science (B.S.) Cyber Forensics And Information Security -
Keiser University-Ft LauderdaleCyber/Computer Forensics And Counterterrorism -
CodecademyFull Stack -
Zero To Mastery Academy
Frequently Asked Questions about Gilberto De Leon
What company does Gilberto De Leon work for?
Gilberto De Leon works for Ltk
What is Gilberto De Leon's role at the current company?
Gilberto De Leon's current role is Staff Security Engineer | Product Security.
What is Gilberto De Leon's email address?
Gilberto De Leon's email address is gd****@****res.com
What schools did Gilberto De Leon attend?
Gilberto De Leon attended University Of South Florida, Keiser University-Ft Lauderdale, Keiser University-Ft Lauderdale, Codecademy, Zero To Mastery Academy.
What skills is Gilberto De Leon known for?
Gilberto De Leon has skills like Security, Networking, Troubleshooting, Microsoft Office, Servers, Military, Leadership, Computer Security, Information Technology, Software Installation, Active Dod Secret Clearance, Active Directory.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial