Richard H. Email and Phone Number
Richard H. work email
- Valid
Richard H. personal email
I am currently a Tier 2 Information Security Analyst at Cisco's Advance Threat Analytics (ATA) SOC. As an analyst, I analyze network activity to determine if an attacker or malware successfully compromises a host or server. This analysis includes trending available information to develop a timeline of the attack, performing threat intelligence, and identifying unsuccessful attacks based on PCAP analysis and web server responses.I studied Cyber Forensics and Security at Purdue University to increase my knowledge about the cyber security field. I have a basic understanding on utilizing of Forensic Toolkit, the forensic mobile field system used in Purdue University's cyber forensics lab, performing forensics on various mobile devices, and extracting data from a mobile device using the JTAG method. Additionally, I worked in a Co-Op internship in RSA Secruity as a Shift Manager and Senior Anti-Fraud analyst.I participated in the ITERA 2015 conference as a presenter, where I presented my research paper called "Fighting Within the Storm: Cloud Forensics and the Problems within It". The research paper looks at what the cloud is and discusses why there are issues in attempting to perform forensics from the perspective of an investigator.My Bachelor's degree from Chaminade University focused on Computer Science and minor in Mathematics. During my time there, I excelled at programming courses of the program and understood the basics of networking in Computer Science. I was a Calculus tutor during my last year and a half due to the recommendation of the Calculus Professor due to my ability to simplify the concepts to an understandable level.
-
CiscoMorrisville, Nc, Us -
Cyber Threat Intelligence Investigator - Cisco Managed ServicesCisco Mar 2021 - PresentSan Jose, Ca, Us• Create high-level documentation related to malware, hacking tools, and threat types• Assist in developing internal documentation related to Threat Intelligence Platforms• Lead the Threat Hunting collaboration between the threat intelligence team and the SOC • Developed threat hunting dashboards to monitor for abnormal activity and novel actors• Developed python scripts to pull information from VirusTotal to enrich our Threat Intelligence Platform• Devise, develop, and refine alerts based on malware and command-and-control activity• Design and Present metrics, trends and threat landscapes to customers and leadership -
Information Security Analyst (Tier 2)Cisco Sep 2018 - Mar 2021San Jose, Ca, Us• Analyze network activity for indications of successful attacks and compromises based off known characteristics, such as Snort or Suricata rules• Provide big data analytics using structured and unstructured syslog from network devices and endpoint agents using python and regular expressions• Executed threat hunts looking for network and traffic-based anomalies, indicators of compromise, and covert signs of infection or breach in various business sectors• Advise customers on incident response procedures and plans of action to address security incidents found in their environments• Monitor log aggregation from the customers’ network to prevent telemetry issues• Provide recommendations for system hardening and tuning of security detection and prevention devices, such as Firepower, McAfee Endpoint Protection, AMP4Endpoints, and Cisco ASA• Mentor and train lower tier analysts and peers in case analysis, threat research, and career growth• Provided training to the department about various cyber security subjects -
Information Security Analyst (Tier 1)Cisco Aug 2017 - Aug 2018San Jose, Ca, Us• Triage and analyze network activity for indications of attacks and compromises based off of known characteristics, such as Snort and Suricata rules• Determine if network attacks were successful based on the logs sent from our customer’s network -
Shift ManagerRsa Security Aug 2016 - Jun 2017Burlington, Massachusetts, Us• Communicate with customers that are primarily international financial institutions.• Mentor, train, and lead analysts during shifts to ensure each position is performed to a high standard.• Ensure shift goals were achieved and technical issues are resolved by problem solving and prioritizing assignments, duties, and technical issues in an ever-changing work environment.• Earned the Outstanding Analyst for 2016 award at the AFCC site at Purdue University. -
Senior Anti-Fraud AnalystRsa Security Jul 2014 - Jun 2017Burlington, Massachusetts, Us• Analyze cyber-crimes, primarily Phishing and Brand Abuse.• Terminate online fraudulent websites, credential drop points, 419 scams, and Trojans.• Comprehensive knowledge of website structures and related authorities.• Team-based environment requiring constant communication between co-workers.• Co-operated and worked with analysts at the primary site located in Israel from the back-up site.• Trained in basic forensic analysis of phishing kits and email headers.• Certified as an anti-fraud analyst on December 2014. -
Peer TutorChaminade University Feb 2013 - May 2014Honolulu, Hawaii, Us• Tutored students in Calculus I and II.• Tutored students in basic computer science and C++.• Successfully managed tutoring 22 students.
Richard H. Skills
Richard H. Education Details
-
Purdue UniversityComputer And Information Technology -
Chaminade University Of HonoluluComputer Science
Frequently Asked Questions about Richard H.
What company does Richard H. work for?
Richard H. works for Cisco
What is Richard H.'s role at the current company?
Richard H.'s current role is Cyber Threat Intelligence Analyst at Cisco CMSP.
What is Richard H.'s email address?
Richard H.'s email address is rh****@****sco.com
What schools did Richard H. attend?
Richard H. attended Purdue University, Chaminade University Of Honolulu.
What are some of Richard H.'s interests?
Richard H. has interest in Mathematics, Computer Forensics, Technology, Education, Literature, Science And Technology, Music, Human Rights, Arts And Culture, History.
What skills is Richard H. known for?
Richard H. has skills like Mathematics, Computer Forensics, Powerpoint, Linux, Forensic Toolkit, Windows, Networking, Anti Phishing, Wireshark, Kali Linux, Html, Boundary Scan.
Who are Richard H.'s colleagues?
Richard H.'s colleagues are Alejandro Avila Picado, Akshata Nayak, Behrouz Hashemi, Satyazit Madala, Warren A., Jacl Thompson, Kendra Lanae Dial.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial