Ken C.

Ken C. Email and Phone Number

Lead Security Analyst @ HackerOne
Lynnwood, WA, US
Ken C.'s Location
New York City Metropolitan Area, United States, United States
About Ken C.

I am a seasoned Cybersecurity professional with over 12 years of hands-on and client-facing experience, adept at delivering cutting-edge solutions and fortifying organizational cybersecurity postures. My expertise spans threat intelligence, threat modeling, red teaming, and security engineering, offering a comprehensive understanding of both offensive and defensive security strategies. Throughout my career, I've successfully enhanced security operations across diverse environments, and now, I am seeking to apply my versatile skill set in roles within security operations. I am committed to safeguarding business information and contributing to the continued safety of organizations in an increasingly evolving cybersecurity landscape. Finally, if you connect with me and send me a message without including the word "WHALE", I'll know that you didn't take the time to get to know me through my profile. No one likes an impersonal cold call for anything (sales, job offers, etc.) People who put forth the effort to personalize that outreach are more likely to develop an authentic relationship. :)

Ken C.'s Current Company Details
HackerOne

Hackerone

View
Lead Security Analyst
Lynnwood, WA, US
Website:
hackerone.com
Employees:
6027
Ken C. Work Experience Details
  • Hackerone
    Lead Security Analyst
    Hackerone
    Lynnwood, Wa, Us
  • Experian
    Security Engineer - Threat Modeling
    Experian Aug 2024 - Present
    Costa Mesa, Ca, Us
  • Career Break
    Personal Goal Pursuit
    Career Break Sep 2023 - Aug 2024
    Taking care of my health/wellbeing.Pursuing personal aspirations.Learning new skills, keeping old skills sharp.Seeing the world, and living life.
  • Resilience
    Senior Security Engineer
    Resilience Sep 2021 - Sep 2023
    New York, Us
    • Delivered expert consultative services to CISOs, CIOs, and Risk Managers of over 30 clients to improve their cyber defense posture, from technological solutioning to security design and governance, leading to increased cyber insurance policy limits.• Developed and delivered interactive cyber tabletop exercises for cross-functional teams, simulating real-world cyber threats and enhancing incident response capabilities.• Provided cybersecurity advice and training to Resilience underwriters, brokers, and policyholders to enable more intelligent risk selection and improve loss ratios., leading to lowest claims rates in industry.• Collaborated with the Data Science team in creating machine learning models to help automate and improve cyber risk quantification efforts necessary for determining insurance limits.
  • Jpmorgan Chase & Co.
    Vice President - Cybersecurity
    Jpmorgan Chase & Co. Jul 2018 - Sep 2021
    New York, Ny, Us
    • Developed operational threat modeling processes that analyze the firm’s ability to mitigate cyber attacks across business and technology environments.• Leveraged MITRE’s ATT&CK Framework to identify network/host/application level attacks and security issues as they relate to threats and vulnerabilities, supplemented by threat intelligence vendor sources, red team operations, SOC alerting, and the open source community.• Engaged with peer groups and information security circles across various Lines of Business (LoBs) regarding cyber threats, to address events such as intrusions, malware, unauthorized access, insider attacks, and loss of proprietary information.
  • Plex Solutions, Llc
    Cyber Security Professional
    Plex Solutions, Llc May 2017 - Jun 2018
    Bethesda, Md, Us
    • Developed strategies and scripts that probed customer's Amazon Web Services (AWS) S3 storage environment for potential data spillage.• Performed penetration and exfiltration engagements against customer's Cross-Domain infrastructure using easily compromised passwords and obscuring file transfers.• Penetrated customer-premise network defense mechanisms using a variety of commercial toolkits, including Kali Linux, Cobalt Strike, and Core Impact.• Conduct internal penetration assessments from an insider threat perspective, utilizing minimal Windows resources in PowerShell, CMD, and scripts written on the fly to achieve maximal compromise in the customer domain.• Participated in collaborative "Purple Team" engagement where step-by-step attack sequences were executed with the purpose of assessing detection and incident response capabilities from defense teams at each stage of the process.
  • United States Department Of Defense
    Digital Network Exploitation Analyst
    United States Department Of Defense Sep 2011 - May 2017
    Washington, Dc, Us
    • Planned and guided Computer Network Exploitation operations on foreign counterterrorism and nation-state targets of interest, focusing heavily on network scanning, enumeration, forensics, and penetration techniques against adversary computer networks.• Provided technical assessments for several well-known anonymizing networks and overall “darknet” characteristics and behaviors.• Researched and identified network- and protocol-based vulnerabilities to enable access into high priority networks.• Analyzed foreign satellite communications infrastructure, radio signal characteristics, and modem capabilities which enable adversarial communications.
  • Tic Software
    Junior Programmer
    Tic Software Dec 2010 - May 2011
    Great Neck, Ny, Us
    Partnered with project manager on the development of a website health check program using C++. Execute code maintenance, development and debugging on web-based SQL application programs.
  • At&T Bell Laboratories
    Intern
    At&T Bell Laboratories Jun 2009 - Aug 2009
    Holmdel, New Jersey, Us
    Collaborated closely with in-house senior engineers on multiple short-term projects surrounding communication device applications.• Independently built data spreadsheets that enabled the effective classification of devices that either passed or failed quality standards.• Documented test data and wrote analytics that determined which system configurations were sufficient for assembly and market distribution.

Ken C. Education Details

  • Rutgers University
    Rutgers University
    Electrical/Computer Engineering
  • University Of Maryland Global Campus
    University Of Maryland Global Campus
    Cybersecurity

Frequently Asked Questions about Ken C.

What company does Ken C. work for?

Ken C. works for Hackerone

What is Ken C.'s role at the current company?

Ken C.'s current role is Lead Security Analyst.

What schools did Ken C. attend?

Ken C. attended Rutgers University, University Of Maryland Global Campus.

Who are Ken C.'s colleagues?

Ken C.'s colleagues are Harshal Thale, James Alex, Soufiane Radouni, Olena Ponomarova, Wael T., Mehdi Rezai, Reda Aimeur.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.