Jason Coleman Email and Phone Number
Jason Coleman work email
- Valid
Jason Coleman personal email
- Valid
Jason Coleman phone numbers
A results-driven, creative, analytical, self-motivated, and experienced cybersecurity professional interested in a challenging tier 2 cybersecurity analyst or threat hunter position that would employ proven technical skills and promote them to benefit a growing organization. 11 years of cyber/technical operations experience throughout Intelligence Community (IC) and USGOV. Master of Professional Studies in Cybersecurity provides a holistic understanding and integrated approach in leveraging all threat hunting processes and IC components to directly support the Cyber/Intel mission and national security strategies at large. Mentored, trained and supervised teams in the areas of Incident Response, Incident Monitoring, and Triage. Delivered support operations to large-scale, country-wide, and global enterprise IT/cyber environments. Utilized enterprise ITSM solutions including FireEye, ServiceNow, BMC Remedy, and Splunk SIEM. Agencies supported throughout career: National Geospatial-Intelligence Agency (NGA), Department of State (DoS), Department of Homeland Security (DHS), Department of Defense (DoD), Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA).
Csios Corporation
View-
Focused Cyber Threat AnalystCsios Corporation Nov 2020 - PresentRockville , Maryland, UsCYBER THREAT INTEL ANALYST:▪ Performing daily classified and unclassified IT/cyber research, identifying possible malware/ vulnerabilities and thousands of associated Indicators of Compromise (IoCs) that could negatively affect the DoS network▪ Experience aligning MITRE ATT&CK framework and Cybersecurity Kill Chain process to Incident Response workflows▪ Operate autonomously to further investigate and update tickets in accordance with protocols and contractual SLAs. Uphold and enforce established processes▪ Authors and provides daily threat intelligence reporting to senior IRM/CIC leadership, highlighting specific cyber vulnerabilities threatening the DoS network, OGAs and global communities of interest▪ Drafts weekly and monthly IoC reports for senior IRM leadership review; results: these executive summary presentations identify and define specific threats to the network and the corresponding level of CIC effort utilized to deter these threats▪ Utilizes Splunk SIEM software solutions to both manage potentially malicious activities and alert senior leadership in near real-time of attacks on the DoS enterprise network▪ Perform daily security event management operations via Splunk Enterprise; populates associated Threat Intel lookup tables with IoCs to alert the CIC and senior IRM staff of possible malicious activities▪ Serve as Point of Contact and Liaison for the CIC. Frequent briefings with Cybersecurity Intel Lead, Cybersecurity Program Manager and FTEs on notable threats -
Threat Intelligence Liaison AnalystSkyepoint Decisions, Inc. Apr 2019 - Oct 2020Dulles, Va, Us▪ Authored and provided daily threat intelligence reporting to senior IRM/CIC leadership; result: illuminated specific cyber vulnerabilities possibly threatening the DoS network, OGAs and global communities of interest▪ Performed daily classified and unclassified research; result: identified possible malware/ vulnerabilities/APTs and documented specific Indicators of Compromise (IoCs) that could negatively affect the DoS network▪ Conducted daily security event management activities via Remedy, Splunk Enterprise and Recorded Future; result: populated Splunk Threat Intel lookup tables with IoCs meeting threat alert criteria.▪ Coordinated efforts with RFI personnel to enhance intelligence reporting sources -
Tier 2 Threat Hunter, Ids AnalystMantech International Corporation Mar 2018 - Apr 2019Herndon, Virginia, Us▪ Performed intrusion detection analysis using Splunk, ArcSight (Snort Code), FireEye and FirePower.▪ Researched Malware using RSA NetWitness, FireEye, and Palantir▪ Performed best-practice malware analytical methodologies on Windows and UNIX-based platforms.▪ Monitored and analyzed network traffic, IDS alerts, network and system logs, and available open source information to detect and report threats to customer networks▪ Performed CERT/SOC operations to include IDS event monitoring and analysis, security incident handling, incident reporting, and threat analysis▪ Responsible for the analysis and reporting of cyber threats and APTs as well as assist in deterring, identifying, monitoring, investigating and analyzing computer network intrusions▪ Provided intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments▪ Created Splunk search queries and employed Splunk dashboards in the areas of network monitoring, web traffic analysis, malware analysis, and triage▪ Used ArcSight for threat hunting, device monitoring, file transfer assessments and vulnerability assessments of information systems▪ Analyzed Web, Email, DDoS, and Malware alerts using FireEye and Firepower consoles, and recommended remediation to senior leadership -
Cybersecurity AnalystCsra Inc Jun 2015 - Feb 2018Falls Church, Va, Us▪ Provided Cybersecurity monitoring and incident response to a Cabinet level federal agency in a SOC Environment▪ Contributed to a team of information assurance professionals working with Intrusion Detection System (IDS) software, analyzing IDS data, creating tickets of formidable process, briefing event details to leadership, and coordinating remediation with personnel throughout the globe ▪ Received and processed events accurately, professionally, and efficiently▪ Used OSINT such as Splunk, RSA and Wireshark to conduct analysis of APTs/incidents reported and recommend appropriate remediation ▪ Coordinated with internal and external teams as needed to analyze events ▪ Conducted CIRT operational duties in accordance with documented processes and procedures▪ Identified operational improvements and efficiencies and suggested improvements to CIRT leadership▪ Mentored, trained and supervised a team of (6) Tier 1 analysts in the areas of Incident Response, Incident Monitoring, and Triage▪ Briefed and coordinated with internal teams, external teams, senior leadership, and upper management as needed to ensure effective CIRT Operations -
Network & Information Security InternNoblis Jun 2014 - Jul 2014Reston, Va, Us▪ Analyzed and briefed metrics on the assets at risk due to malware and outbound data/botnetsReviewed network architecture, SIEM reports and ensured full coverage of weekly scans using Bluecoat Threat pulse, QualysGuard, Palo Alto Firewall, and E-mail Proxy▪ Provided recommendations to improve the overall performance and security of corporate information systems -
Mid-Level Opnet ArchitectAccess Systems, Inc. Apr 2012 - Dec 2012Waukee, Iowa, Us▪ Provided installation and configuration support to USCIS OIT Personnel performing softwareinstallations and configurations of OPNET software▪ Assisted in preparing OPNET concept of operations (CONOPS) and knowledge management articles (KM)▪ Provided consultation on the functionality of OPNET AppResponse Xpert (ARX)▪ Provided traffic reports showing throughput and web transaction activity for monitored applications using ARX▪ Utilized Wireshark to perform TCP/IP packet analysis, log analysis and troubleshooting▪ Managed nodes using AppInternals Xpert (AIX)▪ Experience installing, configuring, operating, and troubleshooting Cisco small to medium-sized route and switched networks▪ Implemented the OSI Model to conduct network traffic and configuration analysis▪ Managed Remedy for configuration management and documenting reports of incidents▪ Managed DHS SharePoint site directories for access control, updating technical documentation and providing meeting minutes. Provided SharePoint training and materials to assist clients in site navigation and file migration.▪ Converted sensitive files to encrypted formats approved by USCIS OIT to safeguard application traffic, IPs and MAC Addresses▪ Detected email phishing as trained by the USCIS Academy -
Systems EngineerAudio Video Systems Oct 2010 - Dec 2011Closed, UsA/V System Design and Integration projects: ▪ Researched, designed, engineered, and generated documentation for installation of audiovisual systems.▪ Generated schematic signal flow diagrams, bill of materials, facility design drawings, projection geometry details, and wiring diagrams for audio and control systems. ▪ Tested and calibrated systems for proper performance in house and on site in a NOC Environment▪ Initially configured video and audio equipment to include user interfaces, video teleconferencing, audio teleconferencing, projectors, display walls, audio matrix mixers, and voice reinforcement systems. ▪ Reverse engineered and resolved discrepancies in system performance -
Electrical Engineer - Low Noise, Small Signal ProjectsEastcor Engineering, Llc Dec 2009 - Aug 2010▪ Utilized Eagle CAD to design digital circuits and boards, prototype circuits, tested and evaluated circuits and boards, troubleshot failed circuits and devices. ▪ Tested C++ applications into concealment prototypes for mission systems. ▪ Employed Google Earth to simulate, monitor, evaluate and troubleshoot the performance of communication devices in-house prior to deployment. -
Office Assistant - Center For Minorities In Science And EngineeringUniversity Of Maryland College Park Sep 2005 - Oct 2005College Park, Md, UsFacilitated the organization and promotion of engineering alumnae events, scholarship programs and math and science competitions. -
Geospatial Engineer (Intern)Washington Suburban Sanitary Commission Jun 2005 - Aug 2005Laurel, Md, UsEngineering Intern – PG & Montgomery County Sewer & Water Main Project: ▪ Utilized ESRI Arc GIS to develop hydraulic modeling to more accurately predict and manage water levels in the Sewer and Water Main systems. Geo-referenced Sewer and Water Main maps projects into Geographical Information Systems (GIS) via JPEG conversion. ▪ Reduced water main breaks of 50% per month by developing an automated database in C to update sewer and water main maps three times per week, compared to once per week previously. Increased information available for analysis regarding pending water main breaks.
Jason Coleman Education Details
-
University Of Maryland Baltimore CountyCybersecurity -
University Of MarylandElectrical Engineering -
Prince George'S Community CollegeEngineering
Frequently Asked Questions about Jason Coleman
What company does Jason Coleman work for?
Jason Coleman works for Csios Corporation
What is Jason Coleman's role at the current company?
Jason Coleman's current role is Tier 2 Cybersecurity Analyst / Systems Engineer (Threat Hunter) / Mid-level Intel Analyst.
What is Jason Coleman's email address?
Jason Coleman's email address is ja****@****int.com
What is Jason Coleman's direct phone number?
Jason Coleman's direct phone number is +170364*****
What schools did Jason Coleman attend?
Jason Coleman attended University Of Maryland Baltimore County, University Of Maryland, Prince George's Community College.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial