Gilberto De Leon

Gilberto De Leon Email and Phone Number

Staff Security Engineer | Product Security @ LTK
Land O' Lakes, FL, US
Gilberto De Leon's Location
Land O' Lakes, Florida, United States, United States
Gilberto De Leon's Contact Details

Gilberto De Leon work email

Gilberto De Leon personal email

n/a
About Gilberto De Leon

As a Product Security Engineer at LTK, a leading influencer marketing platform, I have over ten years of experience in cyber security, a Master's degree in Digital Forensics, and certifications in Ethical Hacking and Cloud. My mission is to design, implement, and manage security controls and architectures that protect LTK's products from threats and ensure compliance with industry standards and regulations.I collaborate with development teams to conduct comprehensive risk assessments, analyze potential threats, and recommend and implement countermeasures. I also leverage tools such as Wiz, Snyk, and OWASP ThreatDragon to address vulnerabilities, and non-compliant configurations. I am passionate about staying up to date with the latest trends and technologies in cyber security and applying them to enhance LTK's product security and customer trust.

Gilberto De Leon's Current Company Details
LTK

Ltk

View
Staff Security Engineer | Product Security
Land O' Lakes, FL, US
Employees:
1009
Gilberto De Leon Work Experience Details
  • Ltk
    Staff Security Engineer | Product Security
    Ltk
    Land O' Lakes, Fl, Us
  • Ltk
    Product Security Engineer
    Ltk Aug 2023 - Present
    Dallas, Tx, Us
    Security Design & Architecture:•Collaborating with development teams to design security controls and architectures that protect against threats.•Implementing security best practices across the product lifecycle.Risk Analysis & Management:•Conducting comprehensive risk assessments on products to identify vulnerabilities.•Implementing risk mitigation strategies and tracking their effectiveness.Threat Modeling & Analysis:•Analyzing potential threats to products and developing threat models.•Recommending and implementing countermeasures to mitigate risks.Compliance & Regulation Alignment:•Ensuring all products meet industry standards and regulatory compliance requirements.•Coordinating with legal and compliance teams to ensure alignment with regional and global regulations.Security Testing & Validation:•Leading penetration testing and security validation efforts.•Collaborating with quality assurance teams to ensure security features are properly tested.Secure Code Training:•Developing and delivering security training for internal teams.•Promoting security awareness across the organization.Vendor & Third-Party Security Management:•Assessing and managing security risks related to third-party vendors.•Collaborating with procurement teams to ensure security is considered in vendor selection.Continuous Improvement:•Participating in security research and staying abreast of the latest security trends and technologies.•Driving continuous improvement initiatives to enhance the organization's security posture.
  • Ltk
    Threat & Vulnerability | Secops | Appsec Manager
    Ltk Mar 2022 - Aug 2023
    Dallas, Tx, Us
    •Execute a vulnerability management strategy across LTK environments including SaaS, PaaS, & IaaS.•Track new and emerging threats to LTK environments.• Provide leadership, mentoring, and continuing education to a team of highly motivated and highly skilled security professionals.•Maturing security processes, increasing automation, and decreasing response times to remediating discovered non-compliant configurations and indicators of compromise.•Perform initial and periodic security assessments for incidents and conducts related ongoing investigation activities in coordination with other corporate functions• Establish security-focused training and hackathons to raise developer awareness of security best practices.•Performe Red Team, Blue Team, and Threat simulations to enhance overall security posture.•Provide continues support as a thought leader for the organization.
  • Red Ventures
    Senior Security Engineer
    Red Ventures Jan 2021 - Mar 2022
    Fort Mill, Sc, Us
    •Assist in the design, evaluation, and implementation of new security technologies for our cloud infrastructure.•Analyzes and recommend security controls and procedures in acquisitions, migrations.•Research, analysis, and response for alerts; including log retrieval and documentation. Responds to security incidents as needed.•Conduct analysis of network traffic and host activity across a wide array of technologies and platforms•Design and build custom tools for investigations, hunting, and research•Provide Threat Intelligence trends, with respect to organizational risk; advises management/business verticals on executing plans for mitigation of risk; performs risk and security assessments and engages and coordinates third-party risk and compliance assessments.•Assist in the continued developments for our security governance, including organizational policies, procedures, standards, baselines and guidelines with respect to both regulatory and compliance requirements.
  • Nielsen
    Cyber Security Incident Responder
    Nielsen Feb 2019 - Oct 2020
    New York, Ny, Us
    • Analyze data, perform research, and verify information for potential misconduct or abnormal behavior.• Analyze data feeds for event detection, and perform correlation analysis on data from multiple monitoring sources.• Respond to cybersecurity events and incidents caused by internal and external threats to our systems, coordinate response activities with various stakeholders for confirmed incidents, and recommend mitigation strategies.• Proactively hunt for adversaries on our networks utilizing a variety of tools and techniques• Triage emerging threats to protect assets and information in the environment.• Produce forensic imaging and coordinate evidence collection for investigations.• Utilize data mining tools to collect, search, sort, and organize large amounts of information.• Research, address, and resolve data loss prevention (DLP), virus alerts, and other security-related events.• Partner with cross-functional technical teams to share expertise, research threats, and implement solutions.• Produce reports, communications and other forms of communication that may be both internal and to include leadership and executive management.• Draft root cause analysis reports and recommendations after cybersecurity incidents.• Identify risk areas that will require vulnerability prevention• Stay current with Security technologies and make recommendations for use based on business value
  • The Depository Trust & Clearing Corporation (Dtcc)
    Team Lead/ Network Penetration Tester
    The Depository Trust & Clearing Corporation (Dtcc) Apr 2016 - Feb 2019
    Jersey City, Nj, Us
    Develop pentest plan in collaboration with stakeholders from Business Units covering the following areas:•Vulnerability assessments•Network penetration testing•Social engineering testing•Lead and execute red team/blue team operations with Global SOC resources•Lead pentester resources from each region•Manage third party that will be performing independent vulnerability or red team assessments methodology•Develop red team methodologies including tactics, techniques and procedures.•Build and maintain cyber arsenal for use in target agreed-upon mission.•Evaluate new measures, tools and technology to deliver red team operation with department.•Regularly consult with the IR/ Intel team to share on emerging threats and TTPs and recommend improvement.•Recommend improvements on controls to help better protect systems and network.•Management Reporting•Approve network penetration testing reports.•Report to management on risks and proposed countermeasure.•Participate in innovation projects & technology evaluation, deployment, build, define advanced threat process and best practices.•Provide advanced threat awareness and education to members of the team.•Assists and mentor a diverse team of analysts.
  • The Depository Trust & Clearing Corporation (Dtcc)
    Cyber Threat Analyst
    The Depository Trust & Clearing Corporation (Dtcc) Aug 2015 - Apr 2016
    Jersey City, Nj, Us
    •Manage and maintain threat intelligence feeds and threat sources for correlation of threat communication information•Support identification of data for data-mining, statistical and security threat analysis•Document custom report formats, event types, and specific finger printing requirements for use in security alerting and remediation workflow.•Respond to escalations from incident response team to provide technical expertise by coordination with appropriate external vendor support.•Analyzing security logs, monitoring logs, firewall logs, intrusion prevention system logs, and network- and core-related logs.•Perform digital forensics of both network and desktop environments•Daily monitoring and maintenance of custome DLP systems, and other relative monitoring tools.•Perform and review DLP policy, workflow and system settings following established DLP change process with the assistance of operational tools and resources.
  • The Depository Trust & Clearing Corporation (Dtcc)
    It Security Analyst
    The Depository Trust & Clearing Corporation (Dtcc) Apr 2015 - Aug 2015
    Jersey City, Nj, Us
    •Provide support for Data Loss Prevention (DLP) platform including analysis and implementation of data loss prevention requirements.•Familiar with regulatory requirements (PCI, SOX, etc)•Document custom report formats, event types, and specific finger printing requirements for use in security alerting and remediation workflow.•Respond to escalations from incident response team to provide technical expertise by coordination with appropriate external vendor support.•Daily monitoring and maintenance of custome DLP systems, and other relative monitoring tools.•Perform and review DLP policy, workflow and system settings following established DLP change process with the assistance of operational tools and resources.•Work within the DTCC incident response system to document events and incidents. •Work with Interfacing with CIS staff to tune and build Vontu policies.
  • Us Army
    Military Police
    Us Army Nov 2004 - Aug 2016
    Arlington, Virginia, Us
    Law Enforcement, Investigations, Combat Ops
  • Security Compliance Associates
    It Security Analyst
    Security Compliance Associates Aug 2015 - Aug 2015
    Clearwater, Fl, Us
    • Assist clients with questions regarding vulnerabilities and propose mitigations: • Write clear, detailed assessment reports • Perform port scanning of small and large networks • Perform vulnerability scanning on systems and applications • Assess mobile & online applications for vulnerabilities • Find/Identify web application vulnerabilities such as cross-site scripting and directory traversal • Perform wireless vulnerability assessments, including access point detection and WEP cracking • Password cracking, assessing strength of passwords hashes ,Generate custom doc/pdf files that tests for the existence of a vulnerability • Perform research, analysis and testing of network and application vulnerabilities
  • Raymond James Financial Inc.
    It Analyst
    Raymond James Financial Inc. Feb 2014 - Apr 2015
    St. Petersburg, Florida, Us
    TSR:•Assistance with logins, passwords, and RSA Secure Access tokens•Assistance with basic troubleshooting and resolution of common errors and known issues•Support with basic how-to assistance for PCs and applications•Aid users with basic installations and configurations, such as drivers, printers, Advisor's Resource Console, and Outlook•Assistance requesting new services, applications, or hardware•Coordination of IT service requests, including status updates and escalation
  • Hewlett-Packard
    It Support Specialist
    Hewlett-Packard Oct 2013 - Jan 2014
    Houston, Texas, Us
    Traveling CSR Technician· team goes out to different military bases and installs computers, upgrades machines, handles deployments, ghost's machines, upgrades networks that are out of date. · Monitor, operate and maintain hardware, software, and networks for a computing platform for all military installations supported by NMCI (Navy Marine Corps Intranet) · Configure, assemble and install laptops, microcomputers, workstations and/or peripheral equipment. · Perform first line support for service interruptions such as printer routing, power outages, wiring problems, and malfunctioning servers and escalate unresolved problems to expedite resolution.· Upgrade, modify and replace hardware, software and network components.
  • Vivjer Computers
    It Support Technician
    Vivjer Computers Jun 2013 - Oct 2013
    Repair, build PC, laptop, servers, apple computers, and consult consumers as far as their business needsNetworking – Routers, Switches, Firewall, Wireless, IP TelephonyDisaster Recovery PlanningSecurity testing and fortificationIT Audits

Gilberto De Leon Skills

Security Networking Troubleshooting Microsoft Office Servers Military Leadership Computer Security Information Technology Software Installation Active Dod Secret Clearance Active Directory Windows Management Disaster Recovery Python System Administration Comptia A+ Certification Powerpoint Outlook Public Speaking Comptia Security+ Customer Service Analysis Time Management Counterintelligence Firewalls Microsoft Excel Microsoft Word Html Information Assurance Humint Routers Hardware Computer Hardware Net+ Linux+ Research Photoshop Budgets Strategic Planning Mta Security Access Printers Vulnerability Assessment Intelligence Analysis Computer Forensics Printer Support Information Security

Gilberto De Leon Education Details

  • University Of South Florida
    University Of South Florida
    Masters In Digital Forensics
  • Keiser University-Ft Lauderdale
    Keiser University-Ft Lauderdale
    Bachelor Of Science (B.S.) Cyber Forensics And Information Security
  • Keiser University-Ft Lauderdale
    Keiser University-Ft Lauderdale
    Cyber/Computer Forensics And Counterterrorism
  • Codecademy
    Codecademy
    Full Stack
  • Zero To Mastery Academy
    Zero To Mastery Academy

Frequently Asked Questions about Gilberto De Leon

What company does Gilberto De Leon work for?

Gilberto De Leon works for Ltk

What is Gilberto De Leon's role at the current company?

Gilberto De Leon's current role is Staff Security Engineer | Product Security.

What is Gilberto De Leon's email address?

Gilberto De Leon's email address is gd****@****res.com

What schools did Gilberto De Leon attend?

Gilberto De Leon attended University Of South Florida, Keiser University-Ft Lauderdale, Keiser University-Ft Lauderdale, Codecademy, Zero To Mastery Academy.

What skills is Gilberto De Leon known for?

Gilberto De Leon has skills like Security, Networking, Troubleshooting, Microsoft Office, Servers, Military, Leadership, Computer Security, Information Technology, Software Installation, Active Dod Secret Clearance, Active Directory.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.