Michael Poindexter Email and Phone Number
Cybersecurity Professional with over 4 years of experience in a Security Operations Center (SOC) for the United States Air Force at the Air Force Computer Emergency Response Team (AFCERT). Extensive experience working in a large Enterprise Environment in both technical and managerial roles. Special focus areas are Incident Management, Threat Hunting, and Incident Response.
-
Information Security ManagerAmd Jun 2021 - PresentSanta Clara, California, Us -
Cyber Threat HunterUnited States Air Force Apr 2020 - PresentRandolph Afb, Tx, Us• Developed immediate Threat Hunt packages/strategies for several critical and emerging cybersecurity events including Sunburst/Supernova and Zerologon; provided new detections and response plans to Incident Response Team and Network Operations Center.• Leads Enterprise Threat Hunting Team focusing on identifying and characterizing Advanced Persistent Threats (APTs) the Air Force Information Network; develops and optimizes static defenses including IDS/IPS detections and HIDS signatures with integration into SIEM alerts based on threat hunt findings.• Employs Endpoint Detection and Response tools such as Tanium to identify and respond to host-based indicators of compromise; performs initial triage of intrusions and advises Incident Response Team on subsequent investigations.• Utilizes established Cybersecurity frameworks such as MITRE ATT&CK to develop and focus proactive threat hunts on adversary tactics, techniques and procedures where automated detection gaps exist and develops potential fix actions to remediate static defense shortfalls. -
Incident ManagerUnited States Air Force May 2019 - Apr 2020Randolph Afb, Tx, Us• Managed over 5k cybersecurity investigations across 800k+ endpoint, geographically diverse networks which handle a variety of information including Classified, PII, and HIPAA information.• Served as key communication point between SOC analysts and higher authorities and mission partners; coordinated investigations involving many disparate network enclaves and informed C-level executives on incidents and investigations.• Coordinated incident reconstitution efforts between multiple geographically separated units; reviewed and optimized incident handling procedures and SOPs for both analysts and responding sysadmins. -
Cyber Defense Incident ResponderUnited States Air Force Mar 2018 - May 2019Randolph Afb, Tx, Us• Acquired and analyzed forensic artifacts on Windows/Linux workstations using a variety of tools including Encase, Volatility, and Sysmon; characterized threats/adversary activity, and outlined remediation recommendations.• Identified a wide variety of malicious Indicators of Compromise (IOCs) including rogue autoruns, processes, and installed applications to characterize compromises across the Air Force’s Enterprise Network.• Applied Host Forensic principles to identify initial access attack vectors, persistence mechanisms, lateral movement, command and control, and evasive actions across affected hosts; integrated a variety of data sources into comprehensive incident reports for both technical and high-level audiences. -
Tier One Soc AnalystUnited States Air Force Mar 2017 - Mar 2018Randolph Afb, Tx, Us• Analyzed near-real-time SIEM alerts for potentially malicious traffic using security products such as Arcsight, Splunk, Fidelis, and Solera’s BlueCoat DeepSee.• Investigated packet capture (PCAP) utilizing Wireshark and other network forensic tools, created cases for follow-on investigation by Incident Response Team.• Applied Network Forensics techniques to identify callback domains, malicious web attacks/traffic, and data exfiltration across the Air Force Network. -
Targeting Intelligence AnalystUnited States Air Force Sep 2011 - Mar 2017Randolph Afb, Tx, Us• Performed All-source intelligence analysis supporting Crisis Action Planning and Target Analysis; analyzed adversary target systems and points of interest to determine weaknesses and single points of failure for exploitation.• Instructed 30+ Targeting Analysts in both the key principles and technical skills of the Joint Targeting Process, Joint Operational Planning, and Intelligence Fundamentals and Fusion. Key skills taught included Weaponeering, Target Development, and Precise Point Mensuration.
Michael Poindexter Education Details
-
Western Governors UniversityCybersecurity -
Community College Of The Air ForceCybersecurity -
Community College Of The Air ForceIntelligence Studies And Technology
Frequently Asked Questions about Michael Poindexter
What company does Michael Poindexter work for?
Michael Poindexter works for Amd
What is Michael Poindexter's role at the current company?
Michael Poindexter's current role is Information Security Manager at AMD.
What schools did Michael Poindexter attend?
Michael Poindexter attended Western Governors University, Community College Of The Air Force, Community College Of The Air Force.
Who are Michael Poindexter's colleagues?
Michael Poindexter's colleagues are Hossam Shabaan, Nushrat Simi, Nicholas Ronoh, Kathyayini Yr, Jim Rowan, Vamsi Krishna, Anshul Mehta.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial