Melissa Dow work email
- Valid
- Valid
- Valid
- Valid
Melissa Dow personal email
As a highly ambitious, enterprising IT professional with a passion for “fighting cybercrime,” I am on a constant journey to develop my technical skillset. I believe investing in yourself is an integral part of making a daily impact on the cyber industry.Currently, I work as a Cyber Security Engineer Tester specializing in Web Application Pen-testing at CGI Inc. My professional experience includes conducting OWASP Top 10 focused web application vulnerability assessments for the Marine Corps, CGI customers, and CGI Inc. proprietary applications.I have previous experience as a Cyber Systems Engineer for Army Knowledge Online completing security investigations, analyzing security logs, performing daily security monitoring and threat detection, developing security policies and procedures, documenting information assurance requirements, and preparing executive summaries for leadership. Over the course of my 8+ years as a Cyber Systems Engineer I have acquired five certifications; CompTIA Security +, GCIH, GCIA, CEH, and CHFI. I was a 2015-2016 candidate in the Mentoring the Technical Professional program within Northrop Grumman. I also participated in the creative process and validation team on the Hack the Marine Corps Bug Bounty program.
-
Cgi Team Manager Application SecurityCgi Jul 2024 - PresentMontreal, Quebec, Ca -
Senior Cyber Security Engineer/TesterCgi Apr 2022Montreal, Quebec, Ca• Perform DAST and SAST application security testing techniques, using automated tools and manual testing (i.e. Burpsuite, OWASP ZAP, Fiddler, HP Fortify, Checkmarx, Dependency Checker)• Create exploit proofs of concept and report vulnerabilities to application PMs and developers• Identify application security weaknesses, and write recommendations for preventing or fixing them• Analyze and Respond to vulnerability inquiries and vulnerability reports• Research and implement new threats and attack vectors that impact web applications and infrastructure• Assess new and existing applications and system deployments for vulnerabilities and design flaws, and prioritize remediation efforts based on risk level• Support and consult with product and development teams in the area of application security• Serve as subject matter expert for secure coding practices, penetration testing, and all aspects of application and product security• Collaborate and coordinate security assessment scope, schedule, and requirements with team members and application leads on a daily basis• Serve as primary Point of Contact for multiple projects at one time• Review code for common security vulnerabilities• Analyze and present results of testing to team members, managers and customers• Develop tools to aid penetration test automation and effectiveness• Manage the implementation process for assigned projects. Estimate work effort on a project• Comfortable working with teams from multiple domains and flexible in working on a wide variety of tasks spanning the full stack, Application Security, System Software and Security Analytics• Serve as lead for team; schedule and allocate resources across multiple projects, prepare and maintain documentation for internal and external processes, support onboarding for new hires -
Cyber Intelligence Analyst 3Peraton (Previously Northrop Grumman) May 2017 - Apr 2022Reston, Virginia, Us• Perform lifecycle web application penetration testing to identify security issues and known/unknown vulnerabilities. • Conduct web vulnerability assessment and recommend improvements to web devices and IoT security posture. Test various web attack vectors including: SQL injection, XSS, content and header injection, target data reconnaissance. • Plan and conduct dynamic and static analysis of web applications using BurpSuite, NetSparker, and Acunetix WVS. Analyze servers for potential vulnerabilities as a result of operational, technical, or design flaws. • Verify SSL authentication and crypto configuration compliance policies and provide detection and remediation strategies for best practice. • Research open source intelligence feeds to identify potential threats to DOD web applications. • Conduct quarterly wireless scanning to identify rogue systems not approved by DOD. • Develop and enforce web access policies in accordance with DOD and DCSA directives. • Present exploitation results and recommend changes and countermeasures to leadership as Subject Matter Expert to support enterprise security. • Generate After Action Reports (AAR) with technical proof-of-concepts and mitigation techniques for site owners. • Teach OWASP Top 10 Web Application Pentesting course to DCO Team members. Design course material. • Triaged and validated vulnerabilities and provided remediation guidance during execution of the Hack the Marine Corps Bug Bounty program consisting of 100 HackerOne participants. -
Cyber Information Assurance Analyst 2Northrop Grumman Corporation Aug 2015 - May 2017Falls Church, Va, Us•Perform analysis of system/network incidents to determine root cause and develop mitigation techniques for preventing similar incidents. •Complete compliance audits and active evaluations on current and future systems/software to discover possible vulnerabilities that could be introduced to the AKO-ES Enterprise Network. •Develop and maintain standard operating process and procedures in the areas of security analysis, security certification, security documentation. •Perform direct interaction with the customers to explain security related issues and provide courses of actions to remediate these issues. •Assist in the implementation of the required government policy (i.e., STIGs, RMF), and make recommendations on process tailoring and complete documentation required by these activities. •Provides solutions to a variety of technical problems of increasing scope and complexity as assigned -
Cyber Systems EngineerNorthrop Grumman Corporation Jul 2012 - Aug 2015Falls Church, Va, Us• Security incident investigation: Analyzed security logs to determine root cause; assessed damage.• Security Monitoring/ Threat Detection: Performed daily IDS analysis/monitoring and generated technical and executive summary reports; Investigated traffic logs through data mining to ensure preventative security and prevent future compromises; Examined firewall and VPN traffic logs for anomalies and security threats for remediation.• Security compliance: Established and maintained user account privileges for incoming and outgoing personnel.• Security policy and procedures: Developed uniform standard operating procedures; Worked with multiple teams at the client site to ensure that security policies are being followed; Briefed leaders on security weaknesses; Gathered and organized technical information for the development and maintenance of system security plans (SSPs) and acceptable behavior policies. Created Work Flow Process diagrams and documentation to support security tracking and auditing.• Security Training and Communications – Wrote quarterly security newsletter for program-wide distribution; Created training materials focused on best practice scenarios; Conducted routine audits of all program personnel to ensure compliance with established standards, policies, procedures, and certification requirements. Prepared executive summaries for leadership documenting recent security events and actions taken.• Validated and coordinated HBSS scheduled maintenance. -
College Administrative InternNorthrop Grumman Corporation May 2010 - Jan 2012Falls Church, Va, Us• Designed and implemented Access database for Tax/Audit department capable of merging over 300 billing records. Presented end product to entire tax group and created related training materials.• Wrote chapters in Program Planning and Control (PP&C) Field Guide, labor reports, proposal review, billing labor categories, and organizational flowcharts.• Participated on a team that resolved approximately $800,000 in outstanding billing hours.• Assisted Northrop Grumman project schedulers and trained in EVMS, EAC, Finance Indirect Rates, Project Scheduling and SAP. Received Northrop Grumman training in Business Management Basics and Cyber Security. • Assisted the Capture Team in gathering information for successfully strategizing a Price to Win proposal within Northrop Grumman.
Melissa Dow Skills
Melissa Dow Education Details
-
James Madison UniversityComputer Information Systems -
Marymount University
Frequently Asked Questions about Melissa Dow
What company does Melissa Dow work for?
Melissa Dow works for Cgi
What is Melissa Dow's role at the current company?
Melissa Dow's current role is CGI Team Manager Application Security.
What is Melissa Dow's email address?
Melissa Dow's email address is me****@****ngc.com
What schools did Melissa Dow attend?
Melissa Dow attended James Madison University, Marymount University.
What skills is Melissa Dow known for?
Melissa Dow has skills like Security Clearance, Security +, Earned Value Management, Dod, Government Contracting, Analysis, Program Management, Process Improvement, Microsoft Office, Integration, Java, Requirements Analysis.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial