Keith Fields Email and Phone Number
Keith Fields work email
- Valid
- Valid
- Valid
- Valid
Keith Fields personal email
- Valid
- Valid
Keith Fields phone numbers
Cyber Security Professional and Marine Corps Veteran who is focused on securing organizations to prevent/mitigate compromises. I enjoy sharing my experiences as well as information around cyber security as well as becoming a better human.Qualifications include a degree in Criminal Justice Computer Science; GIAC Certified Forensic Analyst, GIAC Certified Forensic Examiner, GIAC Certified Incident Handler, GIAC Continuous Monitoring, and Security+ designations; and detailed knowledge of cyber security tools, technologies and best practices. 18 years of experience in the Information Technology field with the last 9 years focused on Information Security within Incident Response, Digital Forensics and Malware Analysis. Active member of the Columbus Chapter of InfraGard.
-
Senior Sales EngineerSentinelone Feb 2022 - PresentMountain View, California, UsSentinelOne pioneers autonomous endpoint protection, going beyond antivirus to defend against advanced threats. Our solutions empower organizations to safeguard digital assets with confidence.Technical Expertise: As a Singularity Mobile expert, I craft tailored solutions to address unique mobile security challenges. My in-depth knowledge ensures clients receive top-notch cybersecurity strategies.Strategic Sales Approach: Collaborating with the Enterprise Sales team, I deliver impactful presentations showcasing SentinelOne's value. By understanding client pain points, I create solutions that exceed expectations.Client Relationship Building: I prioritize strong client relationships, aligning solutions with business objectives. I provide ongoing support for seamless integration and maximum value.Dedicated to the Ohio Valley region, I navigate its dynamic business landscape. Partnering with organizations, I help them stay ahead of emerging threats and enhance their cybersecurity posture. -
Solutions ArchitectTrellix Jan 2022 - Feb 2022Plano, Texas, UsFormerly FireEye. -
Solutions ArchitectFireeye, Inc. Jan 2020 - Jan 2022Milpitas, California, Us -
Consulting Sales Engineer - Ohio ValleyFireeye, Inc. May 2017 - Jan 2020Milpitas, California, UsUsing my years of experience as an Incident Handler, Digital Forensic Investigator, and a Security Operations Center Manager to help others to identify the appropriate FireEye Products that can be used to strengthen their security operations.- Endpoint Protection with our HX appliance allowing SOC's and IR Teams the ability to search for Indicators of Compromise using intelligence from our FireEye/iSight Analysts and our Mandiant Incident Responders. Agent deployment is possible on Windows, Mac, and RedHat Linux.- Network Security with our NX appliance purpose-built for security, to detect and stop attacks that traditional security products miss and empower you to rapidly respond to threats in near real-time.- Email Security is a store-and-forward email analysis solution that:Reduces risk of unauthorized access to your people, data and assets. Protects your brand and reputation by preventing high-profile breaches. Provides the what, who and why of threats and threat actors, optimizing valuable security resources. Offers on-premise, cloud and hybrid deployment options- Threat Analytics Platform (TAP) applies threat intelligence, expert rules and advanced security data analytics to noisy event data streams. By revealing suspicious behavior patterns and generating alerts that matter, security teams can prioritize and optimize their response efforts. TAP goes beyond traditional SIEM technologies to provide enterprise-wide visibility, codified detection expertise and guided investigation workflows to amplify your defense against today’s most sophisticated cyber-attacks. -
Security Operations Center ManagerBattelle Dec 2013 - May 2017Columbus, Ohio, Us• Established a functional Security Operations Center (SOC) providing situational awareness to senior management and members of the Information Security Department.• Direct the operations of the SOC in real-time monitoring and rapid reaction to alerts and anomalies generated by security tools.• Create processes and procedures to allow events to quickly and accurately be classified, prioritized and escalated appropriately when necessary.• Provide overall direction during execution of the incident response process, providing advanced analysis and direction.• Direct the completion of post mortem analysis, document findings and provide recommendations to proper security and infrastructure teams.• Research and keep abreast of testing tools, techniques, and process improvements in support of security event monitoring, detection and incident response.• Create and provide reports to management regarding the performance of incident management and the state of network and data security from an operational level.• Provide feedback to operations, engineering and risk & compliance teams as required.Direct development of metrics required to manage improvement in SOC processes and procedures. • Interact with other teams to provide the measurements needed to effectively manage their information risk and current global security risk level.• Fostered continuous improvement within SOC, identifying opportunities and tools.• Manage team to ensure 8x5 monitoring of the Enterprise Telecommunication Network while working with a Managed Security Service vendor responsible for 24x7x365 monitoring.• Established a training plan for new personnel within the SOC. -
Digital Forensic Lead / Incident ResponseBattelle Feb 2012 - Dec 2013Columbus, Ohio, Us• Lead digital forensics investigator responsible for the technical media, network, and memory forensics performed as part of investigations.• Served as chief technical point of contact and coordinator for all joint digital forensic investigations.• Served as the Incident Response Team Lead and Incident Management Lead during the course of Cyber Incidents.• Coordinated with both the office of Security and that of the CIO regarding investigations.• Performed investigative analysis as needed to support routine business functions and also in support of project/task activities.• Developed Custom Signatures for Incident Response (Mandiant IOC)• Mitigated malicious threats to network entities and analyzed the discovered threats/systems.• Federal Law Enforcement Collaboration -
Data Communications ChiefUnited States Marine Corps Aug 2003 - Apr 2013Washington, Dc, UsStaff Sergeant, Unites States Marine Corps (Reserves)Units: 4th MLG Fwd East (Camp Lejeune, NC)Communications Company, HQ Bn, 4th Mar Div (Cincinnati, OH) -
Nmci Project Chief - 2Nd Marine Logisitics GroupUnited States Marine Corps Jan 2005 - Jun 2006Washington, Dc, UsRecalled back to Active Duty in support of Operation Iraqi Freedom and assigned to the 2nd Marine Logisitics Group G-6. -
Network Administrator (H&Hs G-6)United States Marine Corps Jun 1999 - Aug 2003Washington, Dc, UsActive Duty -
Digital Forensic Examiner / Incident ResponseDefense Logistics Agency Mar 2009 - Feb 2012Fort Belvoir, Va, UsIncident Handler / Forensic Analyst• Coordinated activities intended to resolve or mitigate damage associated with security incidents and emerging security events, threats or intrusions.• Utilized analytical and investigative techniques to identify, collect, examine and preserve evidence/information which is magnetically stored or encoded, utilizing manual methods and advanced forensic tools. • Securely handled evidence/information to protect it against damage or tampering, and establishes a chain of custody for all evidence/information gathered. • Identified, discovered, and recovered files from a variety of systems, including but not limited to Windows, and Linux/UNIX.• Analyzed data captured by intrusion detection systems, firewalls, and other sensors and enterprise logs, in order to identify, categorize, assess, report, and respond to computer and network security incidents.• Monitored and maintained situational awareness of computer and network vulnerabilities, threats, and associated emerging exploitation. • Performed Computer Network Defense (CND) assessment for action, priorities, and prepared Information Assurance Vulnerability Management (IAVM) products which include Taskings, Advisories, and Bulletins with suspense and site compliance requirements on remediation and mitigation actions.• Provided advice and assistance to field activities in connection with one or more specific technologies associated with computer and network security operations. -
Network AdministratorEyak Technology, Llc Sep 2008 - Mar 2009Dulles, Va, Us• Provided Tier 1 technical support for networking equipment throughout the world in a 24/7 Network Operation and Security Center.• Provided troubleshooting results of network routers and switches to Tier 2 network engineers.• Monitored applications for performance and availability using Mercury Business Availability Center.• Monitored ArcSight Intrusion Detection Systems and provided technical information to Information Security.• Provided technical support for remote users connecting to agency networks.• Created and updated informational slides pertaining to network, application, server, and site outages to be used in Daily Operational Updates to senior management. -
Network AdministratorTeksystems Apr 2008 - Sep 2008Hanover, Md, Us• Provided Tier 1 technical support for networking equipment throughout the world in a 24/7 Network Operation and Security Center.• Provided troubleshooting results of network routers and switches to Tier 2 network engineers.• Monitored applications for performance and availability using Mercury Business Availability Center.• Monitored ArcSight Intrusion Detection Systems and provided technical information to Information Security.• Provided technical support for remote users connecting to agency networks.• Created and updated informational slides pertaining to network, application, server, and site outages to be used in Daily Operational Updates to senior management. -
System AdministratorElectronic Data Systems Aug 2006 - Apr 2008Houston, Texas, Us -
Advance Desktop Support TechnicianTriton Services Inc. Aug 2003 - Jan 2005Employed until August 2006. January 2005, I was recalled back to Active Duty for 18 months.
Keith Fields Skills
Keith Fields Education Details
-
Sans Technology InstituteMaster Of Science (Ms) In Information Security Engineering -
University Of Arkansas GranthamCriminal Justice Computer Science -
American Military UniversityInformation Technology
Frequently Asked Questions about Keith Fields
What company does Keith Fields work for?
Keith Fields works for Sentinelone
What is Keith Fields's role at the current company?
Keith Fields's current role is Senior Sales Engineer at SentinelOne | USMC Veteran.
What is Keith Fields's email address?
Keith Fields's email address is fi****@****lle.org
What is Keith Fields's direct phone number?
Keith Fields's direct phone number is +161442*****
What schools did Keith Fields attend?
Keith Fields attended Sans Technology Institute, University Of Arkansas Grantham, American Military University.
What are some of Keith Fields's interests?
Keith Fields has interest in Mandiant For Security Operations, Digital Forensics, Internet Evidence Finder (Ief), Accessdata Ftk, Openioc, Mobile Forensics, Computer Forensics, Accessdata Mpe, See Less, See 3.
What skills is Keith Fields known for?
Keith Fields has skills like Security, Network Security, Information Security, Computer Forensics, Information Assurance, Troubleshooting, Computer Security, Networking, Firewalls, Intrusion Detection, Information Technology, Vulnerability Management.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial