Peter Paccione Email and Phone Number
Peter Paccione work email
- Valid
- Valid
Peter Paccione personal email
- Valid
Seeking 1099/C2C contracts - message me if consultants of similar skill are requiredHighly skilled and experienced Penetration Tester with an impressive record of accomplishments in the cybersecurity industry, specializing in network security. Demonstrated exceptional leadership abilities in managing and guiding technical teams through projects of varying sizes. Versatile, meticulous, and adept at addressing complex technical challenges and producing comprehensive system documentation. A strong advocate for collaboration and teamwork, with a talent for educating and supporting end users. Committed to staying current with network technologies and thriving in both autonomous and team-oriented work settings.
Secure Consulting Solutions Llc
View-
Application Penetration TesterSecure Consulting Solutions Llc Jan 2015 - PresentAlexandria, Virginia, Us* Conducted Google Partner Security Assessments, both retesting current partners and perspective Google partners.* Performed Application Penetration Tests on many high-profile web applications. Found numerous critical, high and medium vulnerabilities.* Proficient in understanding application level vulnerabilities like XSS, SQL Injection, CSRF, authentication bypass, cryptographic attacks, authentication flaws etc.* Created professional vulnerability reports to be delivered to Google and sites within the Alexa top 500* Security testing of APIs utilizing protocols such as SOAP, JSON, REST and XML. This includes popular frameworks such as Django, Ruby, Flask, * ASP.NET, jQuery, Angular, Bootstrap and many other custom or commercial frameworks.* Extremely proficient with Burp Suite Pro, proficient in various tools/frameworks, and creating custom tools.* Frequently utilized reporting platforms such as Dradis. Used and modified custom macro’s for report writing* Conducted onsite network penetration tests from an insider/outsider threat perspective.* Utilized tools such as Cobalt Strike, Bloodhound and responder to pull NTLM hashes, crack or “pass the hash” to other specified targets. CS beacons would be deployed once a foothold was obtained.* Recognized by for 6 zero Day findings (two combined into CVE-2016-9091), including a severe RCEs, stored XSS and CSRF. CVE’s CVE 2019-9507, 2019-9508, 2019-9509 and CVE-2016-9091 were assigned for said findings* Recognized for rooting both FireEye and BlueCoat appliances (referenced in 2016-9091) -
Security EngineerMindpoint Group, Llc Oct 2013 - Jun 2015Mclean, Virginia, Us* Schedule and assign tasks to security team; ensure that project deadlines are met and short term goals achieved.* Ensure secure implementation to current/new network design, OS setup, AD structure and vCenter design.* Oversee and perform regular patch maintenance with tools such as Nessus/Security Center and Bigfix. * Lead the Insider Threat program for all classified networks within the DOJ.* Assist engineers with in-house cloud development, recommending secure implementation, manually perform ESXi vSphere/OS hardening checks, give subordinate programs advice, etc.* Perform “soft” penetrations tests to identify false positives using tools such as Metasploit; along with other tools contained within Kali Linux. Tailor specific scripts to set web vulnerabilities and verify scan false positives.* Habitually use Sourcefire in conjunction with Wireshark to investigate CERT alerts and troubleshoot network issues.* Write custom SNORT rules tailored to capture specific traffic.* Built and actively maintain both the physical and virtual setup of Sourcefire on multiple networks.* Routinely use Splunk queries and have assisted in the creation of the Splunk in-house “Insider Threat” dashboard.* Regularly perform unique Nmap scans and use scripts to assist networking team in troubleshooting network issues.* Built, maintain and actively monitor Arcsight setup. Frequently connecting new devices to the Arcsight Connector.* Built and actively maintain Squid HTTP/S Proxy. Maintain older Microsoft TMG proxy.* Oversee and manage the implementation of Executive Order 13587 and the “Five Priority” areas, successfully implemented a “Linux based auditing server” for interagency communication and auditing.* Successfully lead entire department (JMD) through a DoD CCRI phase 3 and two DOJ network accreditations.* Successfully led re-accreditations on two different systems using different criteria for the CA process SIPRNet (DoD RMF) and JWICS (NSA/NIST 800-X accreditation). -
ConsultantBooz Allen Hamilton May 2012 - Oct 2013Mclean, Va, Us* Performed risk management for new systems; identified security flaws in hardware and web based applications; provided alternatives for vulnerable hardware and software.* Produced technical reports related to the scope, nature, and characteristics of malicious software and presented to both technical and non-technical audiences. Researched new trends, techniques, and packaging of malicious software staying current and ready to identify and handle zero-day exploits.* Consulted CNIC sites on overall security posture; recommend fixes/mitigations for failing items.* Created network diagrams based on site topologies for use in identifying security flaws.* Analyzed audit logs, router logs, firewall logs, IDS logs and IPS logs ensuring the security and integrity of Navy network communication.* Obtained and received system or site information and use it to evaluate security features of the IT system or site being tested against. This included analyzing scans and verifying zero day mitigations.* Held the role of Information Assurance Officer (IAO) for 13 programs. Monitored security posture, recommended fixes, advised mitigation procedures for IAVA’s and Zero Days for said programs. Brought 6 programs from creation to ATO, also had 3 reaccreditations to ATO. -
Information Assurance Officer (Iao)Specpro Technical Services Aug 2011 - May 2012Washington, Dc, Us* Monitored current reports of computer vulnerabilities to determine implementation and mitigation plan. Tested against false positives using Metasploit Framework, in some cases used manual scripts.* Trained users and promoted security awareness to end users. Helped improve server and network efficiency.* Developed plans to safeguard computer systems against accidental or unauthorized modification, destruction, or disclosure and helped meet emergency data processing standards.* Monitored and worked with DISA Host Based Security System (HBSS) team to ensure compliance with DoD standards. Was responsible for maintaining HBSS alerts, agents, performing upgrades and HBSS system administration. Single handedly built site HBSS server, configured rules and deployed to production network.* Conferred with users to discuss secure implementation, security violations, programming changes, etc.* Monitored firewall logs (Juniper/Cisco) and server logs for any possible malicious activity or security beaches.* Performed security scanning and reviews of scan results to ensure that systems are compliant at all times.* Reviewed STIG’s (Security Technical Implementation Guide) and ensured that the systems and network devices were compliant. Verified results using Retina or manual checks.* Created Disaster Recovery Plan. Helped write and organize program policies, procedures, and tests.* Developed and updated DIACAP documents and maintain the organizations ATO. Performed site audits, tested Contingency Plans, and ensured all other security information was up to date.* Monitored and tracked DoD Information Assurance Vulnerability Alerts (IAVA). Ensured that the System Administrators and Network operations team was maintaining a posture in compliance with said IAVA’s. -
It Security SpecialistNational Institute Of Health & Social Sciences (Rj It Solutions) Apr 2011 - Oct 2011Pk* Was responsible for network load balancer (F5 BigIP). Handled the creation of iRules for the BigIP system; used said iRules to forward traffic, drain servers and reroute traffic in emergencies.* Monitored and maintained firewall. This involved, packet sniffing, monitoring inbound and outbound traffic and investigating nefarious traffic. * Created multiple detailed diagrams of NIH networks using Visio.* Maintained Web security using tools such as Nessus/OpenVas. Performed vulnerability assessments.* Approved requests to register domains with DNS and maintained log of all NIH registered IP’s.* Frequently updated and modified the NIH Certification and Accreditation tool.* Coordinated penetration tests and handled vulnerability remediation for department CA requirements.* Maintained and monitored System Accreditation processes start to finish.* Regularly handled department switches, routers, server applications and underlying OS for configuration.* Handled all SSL certificates for department servers. Worked VeriSign to keep certificates from expiring.* Assisted in monthly server updates by draining servers, blocking specific inbound traffic on the firewalls and forwarding other layer 3 – 7 traffic using BigIP. -
Information Assurance EngineerNaval Surface Warfare Center - Carderock Division (Civil Servant) Mar 2008 - Apr 2011Washington, Dc, Us* Was responsible for all system C&A requests. Handled full lifecycle documentation, start to finish maintenance of the C&A process. Followed the DoD Information Assurance Certification and Accreditation Process (DIACAP).* Frequently workined with Retina and the Gold disk to ensure network and machine safety. This included creating Plan of Action and Milestone (POAM) reports and ensuring proper remediation methods were used.* Enforced NAVSEA guidelines on machines; ensured all machines in local and remote sites were compliant with security policies through regular scanning of machines to update and apply other security-related patches.* Created multiple detailed Visio diagrams for multiple networks. * Performed department vulnerability scans using Retina, Nesses and Nmap. * Tested systems for false positives using scan results. Verified Zero Days using scripts, later using Metasploit Framework. -
Nmci - Navy/Marine Corps IntranetPsi Pax, Inc. Oct 2007 - Mar 2008California, Md, UsConducted onsite support for NMCI Base Operations, NSWC / Carderock Division; developed and implemented a loaner computer program that significantly improved worker productivity.Established and executed in-house operating procedures and documentation process for troubleshooting hardware and software issues for both onsite and remote locations.Acted as liaison between customers and key personnel to determine and solve network, software, and hardware problems and issues. Managed and organized Remedy Queue by scheduling appointments and effectively tracking and resolving all trouble tickets within allotted SLA performance requirements.Provided prompt and accurate technical support, ensuring workstation / server data integrity and utmost customer satisfaction.Conducted network security updates, including updates on various government proprietary software; maintained inventory of machines and peripherals.Performed hands on desk-side support on hardware and software applications; assured system integrity and stability, maintained network printers with firmware updates, and replaced key internal hardware. -
Voluntary WorkCareer Break Jan 2006 - Feb 2006">
Peter Paccione Skills
Peter Paccione Education Details
-
University Of Maryland Baltimore CountyPolitical Science -
Frederick Community CollegeGeneral Studies
Frequently Asked Questions about Peter Paccione
What company does Peter Paccione work for?
Peter Paccione works for Secure Consulting Solutions Llc
What is Peter Paccione's role at the current company?
Peter Paccione's current role is OSCP | OSCE | CEO | Application Penetration Tester at Secure Consulting Solutions LLC.
What is Peter Paccione's email address?
Peter Paccione's email address is pe****@****ail.com
What schools did Peter Paccione attend?
Peter Paccione attended University Of Maryland Baltimore County, Frederick Community College.
What skills is Peter Paccione known for?
Peter Paccione has skills like Security, Network Security, Information Assurance, System Administration, Information Security, Computer Security, Program Management, Firewalls, Security Clearance, Dod, Networking, Computer Hardware.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial