Daniel Perez

Daniel Perez Email and Phone Number

Chief Threat Aficionado at Google Cloud + Mandiant @ Mandiant (now part of Google Cloud)
Daniel Perez's Location
Washington DC-Baltimore Area, United States, United States
Daniel Perez's Contact Details
About Daniel Perez

Ask people who know me well and I believe they would talk about my experience in threat intelligence, malware analysis, managing people, and projects. They hopefully would mention my expertise in creating and implementing processes and procedures that enhance operational efficiencies, and researching threat groups and malware. My successes in these areas have come in cybersecurity and threat intelligence environments. I excel at developing and overseeing personnel who equal and surpass designated objectives and standards. Plus, my expertise includes managing projects from concept to completion ensuring on-time, on-budget, and on-target results. Specialties: Threat IntelligenceNetwork Traffic AnalysisIDS/IPSArcsightSourceFire/Snort Signature DevelopmentWiresharkExperience with IDA pro/Ollydbg, C, Assembly, PythonAPTComputer/Network ForensicsWindowsVarious flavors of LinuxTCP/IPMalware AnalysisMalware Reverse EngineeringIncident Response

Daniel Perez's Current Company Details
Mandiant (now part of Google Cloud)

Mandiant (Now Part Of Google Cloud)

View
Chief Threat Aficionado at Google Cloud + Mandiant
Daniel Perez Work Experience Details
  • Mandiant (Now Part Of Google Cloud)
    Chief Threat Aficionado
    Mandiant (Now Part Of Google Cloud) Jun 2023 - Present
    Mountain View, California, Us
  • Google
    Manager, Mandiant Intelligence
    Google Nov 2022 - Jun 2023
    Mountain View, Ca, Us
  • Mandiant
    Senior Manager, Advanced Practices
    Mandiant Sep 2021 - Nov 2022
    Mountain View, California, Us
    Create and grow new organizational process. Supervise six analysts. Facilitate tasks and managed program. Serve as threat analyst expert.● Enhanced intelligence protocols utilized to merge and cluster activity improving deep research by 300%.
  • Mandiant
    Manager, Advanced Practices
    Mandiant Jan 2020 - Sep 2021
    Mountain View, California, Us
    Coached and guided four personnel on threat intelligence and adversary tactics. Acted as primary contact on threat analysis, nation-state threat activity groups, and financial crime. Designed and launched organizational process for Mandiant Archaeology. Directed six research working groups and conveyed results to company stakeholders and customers.● Co-wrote two blogs on exploitation of zero day CVE-2021-22893 and blog describing exploitation of Pulse Secure VPN appliances by suspected Chinese espionage threat actors in 2021.● Designed and oversaw Survey Unit function focused on historical research into most pervasive threat groups.● Devised new enterprise-wide deep dive research procedure lowering project research time from six months annually to three months.
  • Fireeye, Inc.
    Principal Threat Analyst
    Fireeye, Inc. Jan 2018 - Jan 2020
    Milpitas, California, Us
    Oversaw all threat intelligence, advanced persistent threats, financial crime, and incident response efforts from a threat intelligence perspective. Noted malicious infrastructures. Assessed existing and formed new threat groups based on activity results. Reviewed malicious files, found code family classifications, and determined any detections. Supervised one person.● Noted and tracked various threat intelligence feeds for new malicious software samples.● Appointed as lead threat intelligence analyst on multiple high visibility intrusions.● Co-authored multiple blogs related to Chinese threat group APT41 to conduct cyber espionage, blog on Chinese espionage group targeting Cambodia served as main contributor to completion and publication of APT41: A Dual Cyber Espionage and Cyber Crime Operation.● Co-presented webinar on Double Dragon: APT41, Dual Espionage and Cyber Crime Operation at Mandiant Cyber Defense Summit "APT41: A Unending Game of Thrones."● Analyzed and documented thousands of files for indicators of compromise.
  • Fireeye, Inc.
    Senior Analyst
    Fireeye, Inc. Nov 2015 - Jan 2018
    Milpitas, California, Us
    Guided multiple incident response activities from a threat intelligence perspective. Noted malicious infrastructure and tracked threat intelligence feeds for new malicious software samples. Followed multiple existing and arranged new threat groups. Coached junior threat intelligence analyst.● Supported multiple incident response engagements on known cyber espionage, cybercrime, and uncategorized, operator.● Reviewed and classified thousands of files indicating compromise.
  • U.S. Department Of State
    Malware Reverse Engineer
    U.S. Department Of State Jan 2013 - Nov 2015
    Washington, Dc, Us
    •Perform analysis of malicious code (dynamic/static); packet level traffic analysis; reconstruct network traffic; support forensic analysis; hard drive analysis; Web log analysis; pattern analysis, trend analysis, and behavior analysis; provide remedial recommendations; and produce comprehensive report on findings.•Provide intrusion detection capability; build, test, and deploy customized IDS signatures;monitor specialized packet capturing devices.•Coordinates technical incident response and remediation activities for client environments.•Publishes reports and keeps metrics for client systems.•Coordinate with Federal External Cyber Community•Launches and tracks investigations to resolution•Cyber threat and fusion analysis
  • Lockheed Martin
    Cyber Intel Analyst
    Lockheed Martin Jan 2012 - Jan 2013
    Studied all inbound and outbound network traffic, told management about threats, and recommended optimal mitigation options. Prepared reports, queries, and cases on all suspicious and malicious activity. Supported development of forensics/malicious software analysis initiative to better aid analyst intelligence sources. Analyzed and tracked advanced persistent threats.● Prepared Sourcefire signatures based on indicators and various intelligence sources.● Monitored more than 1 million events and reported hundreds of attempted intrusion activity directed at environment.
  • Apex Systems
    Security Analyst
    Apex Systems Sep 2011 - Jan 2012
  • Avaya Government Solutions
    Cyber Security Intern
    Avaya Government Solutions May 2011 - Aug 2011
    Morristown, New Jersey, Us
    As a highly motivated intern, and under the supervision of Senior Analysts: analyzed and monitored all inbound and outbound connections to the United States Senate Network in a SOC environment to ensure the integrity and reduce the propagation of internet based malware throughout the Senate network. Drafted IAR’s and IR’s according to USCERT guidelines to report any malicious activity originating or targeting Senate computers, and advised the Sergeant At Arms (SAA) or Systems Administrators of various Senate offices on how to re-mediate the malicious activity. Continuously research any new vulnerabilities, exploits and tools used by attackers, to expand knowledge of various systems and hardware used in the industry to prevent known and unknown attacks. Strived to maintain an up to date familiarity of Security best practices and NIST SP 800-61 Incident Response.

Daniel Perez Skills

Intrusion Detection Malware Analysis Computer Forensics Ids Information Assurance Security+ Cyber Security Penetration Testing Linux Arcsight Snort Network Security Apt Certified Ethical Hacker Security Operations Security Policy Development Standard Operating Procedure Development Snort Signture Development Idapro Intelligence Analysis Cyber Intelligence Network+ X86 Assembly Sourcefire Solera Packet Capture Bluecoat Computer Network Defense Cnd Cndsp Netwitness Tcpdump Ollydbg Windows Tcp/ip Traffic Analysis Phishing Deep Packet Inspection Pattern Matching Packet Analysis Log Analysis Netcat Metasploit Nessus Ftk Md5 Reverse Engineering Yara Rules Vmware Encase Splunk

Daniel Perez Education Details

  • George Mason University
    George Mason University
    Cyber Forensic Intelligence Studies
  • U.S. Navy Basic Enlisted Submarine School
    U.S. Navy Basic Enlisted Submarine School
  • Bishop O'Connell High School
    Bishop O'Connell High School
    High School Diploma

Frequently Asked Questions about Daniel Perez

What company does Daniel Perez work for?

Daniel Perez works for Mandiant (Now Part Of Google Cloud)

What is Daniel Perez's role at the current company?

Daniel Perez's current role is Chief Threat Aficionado at Google Cloud + Mandiant.

What is Daniel Perez's email address?

Daniel Perez's email address is dp****@****ail.com

What schools did Daniel Perez attend?

Daniel Perez attended George Mason University, U.s. Navy Basic Enlisted Submarine School, Bishop O'connell High School.

What skills is Daniel Perez known for?

Daniel Perez has skills like Intrusion Detection, Malware Analysis, Computer Forensics, Ids, Information Assurance, Security+, Cyber Security, Penetration Testing, Linux, Arcsight, Snort, Network Security.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.