Keith Fields

Keith Fields Email and Phone Number

Senior Sales Engineer at SentinelOne | USMC Veteran @ SentinelOne
Keith Fields's Location
Pickerington, Ohio, United States, United States
About Keith Fields

Cyber Security Professional and Marine Corps Veteran who is focused on securing organizations to prevent/mitigate compromises. I enjoy sharing my experiences as well as information around cyber security as well as becoming a better human.Qualifications include a degree in Criminal Justice Computer Science; GIAC Certified Forensic Analyst, GIAC Certified Forensic Examiner, GIAC Certified Incident Handler, GIAC Continuous Monitoring, and Security+ designations; and detailed knowledge of cyber security tools, technologies and best practices. 18 years of experience in the Information Technology field with the last 9 years focused on Information Security within Incident Response, Digital Forensics and Malware Analysis. Active member of the Columbus Chapter of InfraGard.

Keith Fields's Current Company Details
SentinelOne

Sentinelone

View
Senior Sales Engineer at SentinelOne | USMC Veteran
Keith Fields Work Experience Details
  • Sentinelone
    Senior Sales Engineer
    Sentinelone Feb 2022 - Present
    Mountain View, California, Us
    SentinelOne pioneers autonomous endpoint protection, going beyond antivirus to defend against advanced threats. Our solutions empower organizations to safeguard digital assets with confidence.Technical Expertise: As a Singularity Mobile expert, I craft tailored solutions to address unique mobile security challenges. My in-depth knowledge ensures clients receive top-notch cybersecurity strategies.Strategic Sales Approach: Collaborating with the Enterprise Sales team, I deliver impactful presentations showcasing SentinelOne's value. By understanding client pain points, I create solutions that exceed expectations.Client Relationship Building: I prioritize strong client relationships, aligning solutions with business objectives. I provide ongoing support for seamless integration and maximum value.Dedicated to the Ohio Valley region, I navigate its dynamic business landscape. Partnering with organizations, I help them stay ahead of emerging threats and enhance their cybersecurity posture.
  • Trellix
    Solutions Architect
    Trellix Jan 2022 - Feb 2022
    Plano, Texas, Us
    Formerly FireEye.
  • Fireeye, Inc.
    Solutions Architect
    Fireeye, Inc. Jan 2020 - Jan 2022
    Milpitas, California, Us
  • Fireeye, Inc.
    Consulting Sales Engineer - Ohio Valley
    Fireeye, Inc. May 2017 - Jan 2020
    Milpitas, California, Us
    Using my years of experience as an Incident Handler, Digital Forensic Investigator, and a Security Operations Center Manager to help others to identify the appropriate FireEye Products that can be used to strengthen their security operations.- Endpoint Protection with our HX appliance allowing SOC's and IR Teams the ability to search for Indicators of Compromise using intelligence from our FireEye/iSight Analysts and our Mandiant Incident Responders. Agent deployment is possible on Windows, Mac, and RedHat Linux.- Network Security with our NX appliance purpose-built for security, to detect and stop attacks that traditional security products miss and empower you to rapidly respond to threats in near real-time.- Email Security is a store-and-forward email analysis solution that:Reduces risk of unauthorized access to your people, data and assets. Protects your brand and reputation by preventing high-profile breaches. Provides the what, who and why of threats and threat actors, optimizing valuable security resources. Offers on-premise, cloud and hybrid deployment options- Threat Analytics Platform (TAP) applies threat intelligence, expert rules and advanced security data analytics to noisy event data streams. By revealing suspicious behavior patterns and generating alerts that matter, security teams can prioritize and optimize their response efforts. TAP goes beyond traditional SIEM technologies to provide enterprise-wide visibility, codified detection expertise and guided investigation workflows to amplify your defense against today’s most sophisticated cyber-attacks.
  • Battelle
    Security Operations Center Manager
    Battelle Dec 2013 - May 2017
    Columbus, Ohio, Us
    • Established a functional Security Operations Center (SOC) providing situational awareness to senior management and members of the Information Security Department.• Direct the operations of the SOC in real-time monitoring and rapid reaction to alerts and anomalies generated by security tools.• Create processes and procedures to allow events to quickly and accurately be classified, prioritized and escalated appropriately when necessary.• Provide overall direction during execution of the incident response process, providing advanced analysis and direction.• Direct the completion of post mortem analysis, document findings and provide recommendations to proper security and infrastructure teams.• Research and keep abreast of testing tools, techniques, and process improvements in support of security event monitoring, detection and incident response.• Create and provide reports to management regarding the performance of incident management and the state of network and data security from an operational level.• Provide feedback to operations, engineering and risk & compliance teams as required.Direct development of metrics required to manage improvement in SOC processes and procedures. • Interact with other teams to provide the measurements needed to effectively manage their information risk and current global security risk level.• Fostered continuous improvement within SOC, identifying opportunities and tools.• Manage team to ensure 8x5 monitoring of the Enterprise Telecommunication Network while working with a Managed Security Service vendor responsible for 24x7x365 monitoring.• Established a training plan for new personnel within the SOC.
  • Battelle
    Digital Forensic Lead / Incident Response
    Battelle Feb 2012 - Dec 2013
    Columbus, Ohio, Us
    • Lead digital forensics investigator responsible for the technical media, network, and memory forensics performed as part of investigations.• Served as chief technical point of contact and coordinator for all joint digital forensic investigations.• Served as the Incident Response Team Lead and Incident Management Lead during the course of Cyber Incidents.• Coordinated with both the office of Security and that of the CIO regarding investigations.• Performed investigative analysis as needed to support routine business functions and also in support of project/task activities.• Developed Custom Signatures for Incident Response (Mandiant IOC)• Mitigated malicious threats to network entities and analyzed the discovered threats/systems.• Federal Law Enforcement Collaboration
  • United States Marine Corps
    Data Communications Chief
    United States Marine Corps Aug 2003 - Apr 2013
    Washington, Dc, Us
    Staff Sergeant, Unites States Marine Corps (Reserves)Units: 4th MLG Fwd East (Camp Lejeune, NC)Communications Company, HQ Bn, 4th Mar Div (Cincinnati, OH)
  • United States Marine Corps
    Nmci Project Chief - 2Nd Marine Logisitics Group
    United States Marine Corps Jan 2005 - Jun 2006
    Washington, Dc, Us
    Recalled back to Active Duty in support of Operation Iraqi Freedom and assigned to the 2nd Marine Logisitics Group G-6.
  • United States Marine Corps
    Network Administrator (H&Hs G-6)
    United States Marine Corps Jun 1999 - Aug 2003
    Washington, Dc, Us
    Active Duty
  • Defense Logistics Agency
    Digital Forensic Examiner / Incident Response
    Defense Logistics Agency Mar 2009 - Feb 2012
    Fort Belvoir, Va, Us
    Incident Handler / Forensic Analyst• Coordinated activities intended to resolve or mitigate damage associated with security incidents and emerging security events, threats or intrusions.• Utilized analytical and investigative techniques to identify, collect, examine and preserve evidence/information which is magnetically stored or encoded, utilizing manual methods and advanced forensic tools. • Securely handled evidence/information to protect it against damage or tampering, and establishes a chain of custody for all evidence/information gathered. • Identified, discovered, and recovered files from a variety of systems, including but not limited to Windows, and Linux/UNIX.• Analyzed data captured by intrusion detection systems, firewalls, and other sensors and enterprise logs, in order to identify, categorize, assess, report, and respond to computer and network security incidents.• Monitored and maintained situational awareness of computer and network vulnerabilities, threats, and associated emerging exploitation. • Performed Computer Network Defense (CND) assessment for action, priorities, and prepared Information Assurance Vulnerability Management (IAVM) products which include Taskings, Advisories, and Bulletins with suspense and site compliance requirements on remediation and mitigation actions.• Provided advice and assistance to field activities in connection with one or more specific technologies associated with computer and network security operations.
  • Eyak Technology, Llc
    Network Administrator
    Eyak Technology, Llc Sep 2008 - Mar 2009
    Dulles, Va, Us
    • Provided Tier 1 technical support for networking equipment throughout the world in a 24/7 Network Operation and Security Center.• Provided troubleshooting results of network routers and switches to Tier 2 network engineers.• Monitored applications for performance and availability using Mercury Business Availability Center.• Monitored ArcSight Intrusion Detection Systems and provided technical information to Information Security.• Provided technical support for remote users connecting to agency networks.• Created and updated informational slides pertaining to network, application, server, and site outages to be used in Daily Operational Updates to senior management.
  • Teksystems
    Network Administrator
    Teksystems Apr 2008 - Sep 2008
    Hanover, Md, Us
    • Provided Tier 1 technical support for networking equipment throughout the world in a 24/7 Network Operation and Security Center.• Provided troubleshooting results of network routers and switches to Tier 2 network engineers.• Monitored applications for performance and availability using Mercury Business Availability Center.• Monitored ArcSight Intrusion Detection Systems and provided technical information to Information Security.• Provided technical support for remote users connecting to agency networks.• Created and updated informational slides pertaining to network, application, server, and site outages to be used in Daily Operational Updates to senior management.
  • Electronic Data Systems
    System Administrator
    Electronic Data Systems Aug 2006 - Apr 2008
    Houston, Texas, Us
  • Triton Services Inc.
    Advance Desktop Support Technician
    Triton Services Inc. Aug 2003 - Jan 2005
    Employed until August 2006. January 2005, I was recalled back to Active Duty for 18 months.

Keith Fields Skills

Security Network Security Information Security Computer Forensics Information Assurance Troubleshooting Computer Security Networking Firewalls Intrusion Detection Information Technology Vulnerability Management Forensic Analysis Dod Cyber Security System Administration Vulnerability Assessment Security Clearance Team Building Incident Management Chain Of Custody Incident Handling Incident Response Security Incident Response Digital Forensics Ftk Malware Analysis Mobile Forensics Information Security Management Network Administration Disaster Recovery Indicators Of Compromise Security+ Arcsight Network Engineering Operational Excellence Cross Functional Team Leadership Technical Support Penetration Testing Giac Ids Mobile Devices Security Operations Security Awareness Ips Cissp Dns Cybercrime Encryption Antivirus

Keith Fields Education Details

  • Sans Technology Institute
    Sans Technology Institute
    Master Of Science (Ms) In Information Security Engineering
  • University Of Arkansas Grantham
    University Of Arkansas Grantham
    Criminal Justice Computer Science
  • American Military University
    American Military University
    Information Technology

Frequently Asked Questions about Keith Fields

What company does Keith Fields work for?

Keith Fields works for Sentinelone

What is Keith Fields's role at the current company?

Keith Fields's current role is Senior Sales Engineer at SentinelOne | USMC Veteran.

What is Keith Fields's email address?

Keith Fields's email address is fi****@****lle.org

What is Keith Fields's direct phone number?

Keith Fields's direct phone number is +161442*****

What schools did Keith Fields attend?

Keith Fields attended Sans Technology Institute, University Of Arkansas Grantham, American Military University.

What are some of Keith Fields's interests?

Keith Fields has interest in Mandiant For Security Operations, Digital Forensics, Internet Evidence Finder (Ief), Accessdata Ftk, Openioc, Mobile Forensics, Computer Forensics, Accessdata Mpe, See Less, See 3.

What skills is Keith Fields known for?

Keith Fields has skills like Security, Network Security, Information Security, Computer Forensics, Information Assurance, Troubleshooting, Computer Security, Networking, Firewalls, Intrusion Detection, Information Technology, Vulnerability Management.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.