Melissa Dow

Melissa Dow Email and Phone Number

CGI Team Manager Application Security @ CGI
Melissa Dow's Location
Gainesville, Virginia, United States, United States
Melissa Dow's Contact Details

Melissa Dow personal email

n/a
About Melissa Dow

As a highly ambitious, enterprising IT professional with a passion for “fighting cybercrime,” I am on a constant journey to develop my technical skillset. I believe investing in yourself is an integral part of making a daily impact on the cyber industry.Currently, I work as a Cyber Security Engineer Tester specializing in Web Application Pen-testing at CGI Inc. My professional experience includes conducting OWASP Top 10 focused web application vulnerability assessments for the Marine Corps, CGI customers, and CGI Inc. proprietary applications.I have previous experience as a Cyber Systems Engineer for Army Knowledge Online completing security investigations, analyzing security logs, performing daily security monitoring and threat detection, developing security policies and procedures, documenting information assurance requirements, and preparing executive summaries for leadership. Over the course of my 8+ years as a Cyber Systems Engineer I have acquired five certifications; CompTIA Security +, GCIH, GCIA, CEH, and CHFI. I was a 2015-2016 candidate in the Mentoring the Technical Professional program within Northrop Grumman. I also participated in the creative process and validation team on the Hack the Marine Corps Bug Bounty program.

Melissa Dow's Current Company Details
CGI

Cgi

View
CGI Team Manager Application Security
Melissa Dow Work Experience Details
  • Cgi
    Cgi Team Manager Application Security
    Cgi Jul 2024 - Present
    Montreal, Quebec, Ca
  • Cgi
    Senior Cyber Security Engineer/Tester
    Cgi Apr 2022
    Montreal, Quebec, Ca
    • Perform DAST and SAST application security testing techniques, using automated tools and manual testing (i.e. Burpsuite, OWASP ZAP, Fiddler, HP Fortify, Checkmarx, Dependency Checker)• Create exploit proofs of concept and report vulnerabilities to application PMs and developers• Identify application security weaknesses, and write recommendations for preventing or fixing them• Analyze and Respond to vulnerability inquiries and vulnerability reports• Research and implement new threats and attack vectors that impact web applications and infrastructure• Assess new and existing applications and system deployments for vulnerabilities and design flaws, and prioritize remediation efforts based on risk level• Support and consult with product and development teams in the area of application security• Serve as subject matter expert for secure coding practices, penetration testing, and all aspects of application and product security• Collaborate and coordinate security assessment scope, schedule, and requirements with team members and application leads on a daily basis• Serve as primary Point of Contact for multiple projects at one time• Review code for common security vulnerabilities• Analyze and present results of testing to team members, managers and customers• Develop tools to aid penetration test automation and effectiveness• Manage the implementation process for assigned projects. Estimate work effort on a project• Comfortable working with teams from multiple domains and flexible in working on a wide variety of tasks spanning the full stack, Application Security, System Software and Security Analytics• Serve as lead for team; schedule and allocate resources across multiple projects, prepare and maintain documentation for internal and external processes, support onboarding for new hires
  • Peraton (Previously Northrop Grumman)
    Cyber Intelligence Analyst 3
    Peraton (Previously Northrop Grumman) May 2017 - Apr 2022
    Reston, Virginia, Us
    • Perform lifecycle web application penetration testing to identify security issues and known/unknown vulnerabilities. • Conduct web vulnerability assessment and recommend improvements to web devices and IoT security posture. Test various web attack vectors including: SQL injection, XSS, content and header injection, target data reconnaissance. • Plan and conduct dynamic and static analysis of web applications using BurpSuite, NetSparker, and Acunetix WVS. Analyze servers for potential vulnerabilities as a result of operational, technical, or design flaws. • Verify SSL authentication and crypto configuration compliance policies and provide detection and remediation strategies for best practice. • Research open source intelligence feeds to identify potential threats to DOD web applications. • Conduct quarterly wireless scanning to identify rogue systems not approved by DOD. • Develop and enforce web access policies in accordance with DOD and DCSA directives. • Present exploitation results and recommend changes and countermeasures to leadership as Subject Matter Expert to support enterprise security. • Generate After Action Reports (AAR) with technical proof-of-concepts and mitigation techniques for site owners. • Teach OWASP Top 10 Web Application Pentesting course to DCO Team members. Design course material. • Triaged and validated vulnerabilities and provided remediation guidance during execution of the Hack the Marine Corps Bug Bounty program consisting of 100 HackerOne participants.
  • Northrop Grumman Corporation
    Cyber Information Assurance Analyst 2
    Northrop Grumman Corporation Aug 2015 - May 2017
    Falls Church, Va, Us
    •Perform analysis of system/network incidents to determine root cause and develop mitigation techniques for preventing similar incidents. •Complete compliance audits and active evaluations on current and future systems/software to discover possible vulnerabilities that could be introduced to the AKO-ES Enterprise Network. •Develop and maintain standard operating process and procedures in the areas of security analysis, security certification, security documentation. •Perform direct interaction with the customers to explain security related issues and provide courses of actions to remediate these issues. •Assist in the implementation of the required government policy (i.e., STIGs, RMF), and make recommendations on process tailoring and complete documentation required by these activities. •Provides solutions to a variety of technical problems of increasing scope and complexity as assigned
  • Northrop Grumman Corporation
    Cyber Systems Engineer
    Northrop Grumman Corporation Jul 2012 - Aug 2015
    Falls Church, Va, Us
    • Security incident investigation: Analyzed security logs to determine root cause; assessed damage.• Security Monitoring/ Threat Detection: Performed daily IDS analysis/monitoring and generated technical and executive summary reports; Investigated traffic logs through data mining to ensure preventative security and prevent future compromises; Examined firewall and VPN traffic logs for anomalies and security threats for remediation.• Security compliance: Established and maintained user account privileges for incoming and outgoing personnel.• Security policy and procedures: Developed uniform standard operating procedures; Worked with multiple teams at the client site to ensure that security policies are being followed; Briefed leaders on security weaknesses; Gathered and organized technical information for the development and maintenance of system security plans (SSPs) and acceptable behavior policies. Created Work Flow Process diagrams and documentation to support security tracking and auditing.• Security Training and Communications – Wrote quarterly security newsletter for program-wide distribution; Created training materials focused on best practice scenarios; Conducted routine audits of all program personnel to ensure compliance with established standards, policies, procedures, and certification requirements. Prepared executive summaries for leadership documenting recent security events and actions taken.• Validated and coordinated HBSS scheduled maintenance.
  • Northrop Grumman Corporation
    College Administrative Intern
    Northrop Grumman Corporation May 2010 - Jan 2012
    Falls Church, Va, Us
    • Designed and implemented Access database for Tax/Audit department capable of merging over 300 billing records. Presented end product to entire tax group and created related training materials.• Wrote chapters in Program Planning and Control (PP&C) Field Guide, labor reports, proposal review, billing labor categories, and organizational flowcharts.• Participated on a team that resolved approximately $800,000 in outstanding billing hours.• Assisted Northrop Grumman project schedulers and trained in EVMS, EAC, Finance Indirect Rates, Project Scheduling and SAP. Received Northrop Grumman training in Business Management Basics and Cyber Security. • Assisted the Capture Team in gathering information for successfully strategizing a Price to Win proposal within Northrop Grumman.

Melissa Dow Skills

Security Clearance Security + Earned Value Management Dod Government Contracting Analysis Program Management Process Improvement Microsoft Office Integration Java Requirements Analysis Software Engineering Proposal Writing System Design Visio Microsoft Excel Microsoft Word Customer Service Powerpoint English Outlook Html Editing C# Asp.net Cyber Security Information Assurance Hbss Mcafee Intrushield Security Manager Sop Development Visual Basic Uml Arcsight Cisco Ironport Android Sdk Linux Oracle Database Sql Evms

Melissa Dow Education Details

  • James Madison University
    James Madison University
    Computer Information Systems
  • Marymount University
    Marymount University

Frequently Asked Questions about Melissa Dow

What company does Melissa Dow work for?

Melissa Dow works for Cgi

What is Melissa Dow's role at the current company?

Melissa Dow's current role is CGI Team Manager Application Security.

What is Melissa Dow's email address?

Melissa Dow's email address is me****@****ngc.com

What schools did Melissa Dow attend?

Melissa Dow attended James Madison University, Marymount University.

What skills is Melissa Dow known for?

Melissa Dow has skills like Security Clearance, Security +, Earned Value Management, Dod, Government Contracting, Analysis, Program Management, Process Improvement, Microsoft Office, Integration, Java, Requirements Analysis.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.