Rick Ivey

Rick Ivey Email and Phone Number

Rick Ivey a Graduate Student in Information Assurance and Practictioner @ Iowa State University
Rick Ivey's Location
Charleston, South Carolina Metropolitan Area, United States, United States
Rick Ivey's Contact Details

Rick Ivey work email

Rick Ivey personal email

About Rick Ivey

Specialties: Network Administration, Network Technical Support, Information Security Policy Review, Vulnerability Testing, Information Technology/Security Auditing, Information Security Awareness, Nessus, Nmap, Wireshark, TCPDump, Retina, Cain & Able, John the Ripper, Netcat, Netstumbler, Kismet, Snort, Metasploit, Dos 6.11, Windows 3.1x-2008, Linux, Netware 5 & 6. Mac OS

Rick Ivey's Current Company Details
Iowa State University

Iowa State University

View
Rick Ivey a Graduate Student in Information Assurance and Practictioner
Rick Ivey Work Experience Details
  • Iowa State University
    Me Information Assurance Student
    Iowa State University Aug 2009 - Present
    Ames, Iowa, Us
    Student at Iowa State. Currently enrolled in their Master's of Engineering in Information Assurance program.
  • Secqurance
    Network Security Consultant
    Secqurance Apr 2009 - Present
    Assist local businesses with Information Security Awareness programs. Migrating older server technology to newer. Lead on Blackberry Professional/Enterprise Server Installs & Support. Lead Anti-Virus/Malware Install & Support. Remote Support for clients that do not have a full time Network Admin on staff.
  • Sans Institute
    Sansfire 2010: Course Facilitator
    Sans Institute Jun 2010 - Jun 2010
    Rockville, Maryland, Us
  • Sans Institute
    Sans Network Security East 2010: Course Facilitator
    Sans Institute Jan 2010 - Jan 2010
    Rockville, Maryland, Us
    Assisted with displays, signage, setup, courseware, inventory and SANS@Night events. SANS Network Security East 2010 was held at the Sheraton in New Orleans, LACourse Facilitator for SEC553: Metasploit for Penetration Testing which was taught by Paul A. Henry.Course Facilitator for AUD507: Auditing Networks, Perimeters, & Systems which was taught by David Hoelzer.Course Facilitator for SEC440: 20 Critical Security Controls: Planning, Implementing and Auditing which was taught by Dr. Eric Cole, PhD.AUD507 Description: One of the most significant obstacles facing many auditors today is how exactly to go about auditing the security of an enterprise. What systems really matter? How should the firewall and routers be configured? What settings should be checked on the various systems under scrutiny? Is there a set of processes that can be put into place to allow an auditor to focus on the business processes rather than the security settings? All of these questions and more will be answered by the material covered in this course. Course prepares the student to earn the GIAC Systems & Network Auditor (GSNA)SEC440 Description: This course helps you master specific, proven techniques and tools needed to implement and audit the Top Twenty Most Critical Security Controls. (All descriptions from www.sans.org)
  • Sans Institute
    Sans Network Security West 2009: Course Facilitator
    Sans Institute Sep 2009 - Sep 2009
    Rockville, Maryland, Us
    Assisted with displays, signage, setup, courseware, inventory and SANS@Night events. SANS Network Security West 2009 was held at the Manchester Grand Hyatt Hotel in San Diego, California.Course Facilitator for AUD429: IT Security Audit Essentials which was taught by James Tarala.Course Facilitator for MGT512: SANS Security Leadership Essentials for Managers with Knowledge Compression which was taught by Stephen Northcutt.AUD429 Description: In the IT Security Audit Essentials course, we feel that we have put together a very strong audit training program, giving both audit theory and strong technical details. It covers the essentials of security, compliance, and IT auditing -- everything you need, nothing you don't. As each topic is discussed in the class, we will strive to first teach the underlying theories and then explain how and what about these topics require the attention of an auditor or compliance officer.MGT512 Description: This completely updated course is designed to empower advancing managers who want to get up to speed quickly on information security issues and terminology. You don't just learn about security, you learn how to manage security. The diligent manager will learn vital, up-to-date knowledge and skills required to supervise the security component of any information technology project. Essential security topics covered in this management track include: Network Fundamentals and Applications, Power, Cooling and Safety, Architectural Approaches to Defense in Depth, Cyber Attacks, Vulnerability Assessment and Management, Security Policies, Contingency and Continuity Planning, Awareness Management, Risk Management Analysis, Incident Handling, Web Application Security, Offensive and Defensive Information Warfare, culminating with our Management Practicum. (All descriptions from www.sans.org)Course prepares the student to earn the GIAC Security Leadership Certification (GSLC).
  • Sans Institute
    Sansfire 2009: Mgt414 Course Facilitator
    Sans Institute Jun 2009 - Jun 2009
    Rockville, Maryland, Us
    Course Facilitator for MGT414: SANS +S Training Program for the CISSP Certification Exam at SANSFIRE 2009. This event was held at the Hilton in Baltimore, Maryland and was taught by Eric Conrad.Assisted with displays, setup, courseware, bookstore sales/inventory and SANS@Night events.Course prepares the student to earn the ISC(2) CISSP and also the GIAC Information Security Professional (GISP).
  • Sans Institute
    Sansfire 2009: Sec561 Student
    Sans Institute Jun 2009 - Jun 2009
    Rockville, Maryland, Us
    Attended SEC561: Network Penetration Testing: Maximizing the Effectiveness of Reports, Exploits, and Command Shells at SANSFIRE 2009. This event was held at the Hilton in Baltimore, Maryland and was taught by John Strand.Course Description: This one-day session builds on the principles of SANS Security 560 with additional discussion and numerous hands-on exercises designed to help attendees make the most of their penetration tests. The course describes using Metasploit functionality to transform payloads into executable programs that are highly useful in penetration tests. We then look at altering the executables with Metasploit's encode functionality, packing them to evade detection, and then loading them onto USB tokens for autoplay attacks on Windows machines, all done in a detailed hands-on exercise. We also address how to write penetration testing reports that have maximum effectiveness in helping an organization to understand its risks based on the findings of a penetration test, motivating positive changes in the security stance of the target organization. The session concludes with a detailed discussion of the critical post-exploitation phase of a penetration test, leveraging built-in Unix, Linux, and Windows tools such as /dev/tcp, telnet clients, and ftp to launch port scans, create backdoor shells, and move files, all techniques that can be directly applied in real-world penetration tests. (Description from www.sans.org)
  • Kotori Technologies, Llc
    Network Engineer
    Kotori Technologies, Llc Feb 2008 - Mar 2009
  • Beta Tech, Now Known As Centura College
    Network Instructor
    Beta Tech, Now Known As Centura College Oct 2007 - Feb 2008
  • United States Marine Corps
    Corporal (E4): Ammunition & Explosives Technician/Information System Specialist
    United States Marine Corps Jun 2001 - Nov 2006
    Washington, Dc, Us
    Fire Team Leader: Responsible for a four-Marine team in guidance with Marine Corps SOP for managing a rifle team as taught in MCT. Administrative duties involve keeping members aware of changes to Drill Schedule and up to date with new information with the Marine Corps Organization.Information System Specialist (MOS 0651): Responsible for configuration and management of both stand-alone and client-server environment computers in support of NMCI.Ammunition & Explosives Technician (MOS 2311): Attached to command to continue with the mission of retrograding ammunition from the Marine Corps and preparing it to be turned over to the United States Army. Supervised all transactions and accounted for personal. Document transactions to supply all combat units with right allocations of ammunition and explosive ordinance to move forward into Iraq from Kuwait (Camp Coyote). Documented all receipts of ammunition ordinances, expended or received. Processed all necessary turn-ins and retrograde from Iraq (LZ Chesty) to ship back to Kuwait in excess of 250,000 rounds of various ammunition valued at over 500 million dollars. One of six from 250 chosen to be the first into Iraq to escort 150 vehicles for re-supplies. Responsible for establishing initial ammunition re-supply points at LZ Basilone and LZ Chesty in Iraq. Corporal of the guard for guarding numerous prisoners of war.
  • Ema, Inc
    System Security Analyst I
    Ema, Inc Apr 2002 - Jan 2003
    St. Paul, Mn, Us
    Provided data entry and on-line help desk support for the INFOSEC Technical Assistance Center (ITAC) Help Desk located at SPAWAR Systems Center, Charleston, SC. Duties include maintaining and providing help desk operation services to SPAWAR Fleet customers, analysis for proper routing and follow up of technical issues for SSCC resolutions.Provided telephone Information Security (INFOSEC) technical support for the ITAC team. Main point of contact for Navy and Department of Defense (DoD) Computer Security (COMPUSEC) and Communications Security (COMSEC) regulations regarding personnel, Certification and Accreditation (C&A), remanence, DODIIS guidance, approved COMPUSEC products, World Wide Web (WWW) page development, Internet usage, phone usage, communications, and media and information transfer. Main POC for multiple PC security related issues at the help desk. Assists with Electronic Key Management Systems (EKMS) and firewall systems by mailing computer based training and assisting with patches. Load and help users with Toolbox, Norton Utilities, and BC-Wipe software.
  • Best Buy
    Service Technician
    Best Buy Sep 1998 - Oct 2002
    Richfield, Minnesota, Us
    Diagnose & solve computer problems; Routine setups and testing of all new computers; Maintaining all computers in the PC Department as fully functional at all times; Consultation on upgrade possibilities with customers; Software and Hardware conflicts, Installation of peripherals and hardware; Ensuring customer satisfaction with prompt knowledgeable service.
  • Dyncorp International
    Computer Operator V (Contract Title)
    Dyncorp International Nov 1999 - Nov 2001
    Mclean, Virginia, Us
    PC/LAN Technician & AWRDs Database Analyst: Assist network Administrator and provide network, hardware, software troubleshooting support for 350+ employees workstation network for the Navel Weapons Stations, Charleston, SC. Network is NT based with Netware 4.11 as the Intranet. In the process of migrating to Netware 5; Assist in Help Desk work and troubleshooting; Repairing and diagnosing computers on the network to determine whether software or hardware and find reasonable solution quickly. Familiar with the AWRDs database. Audio/Visual Specialist: Managed the upper-managements' visual presentations for US Army. Completed numerous MS Power Point presentations for higher dignitaries. Provided support and the set up of Barco Projectors for presentations. Created Computer Security Briefing Power Point presentations.

Rick Ivey Skills

Security Network Security Computer Security Servers Information Security Information Assurance Network Administration Computer Repair Firewalls Information Security Management Vulnerability Assessment Computer Network Operations Networking Linux Penetration Testing Troubleshooting Information Technology Cissp Management Leadership Routers Technical Support Disaster Recovery Software Installation Hardware Testing Help Desk Support Veterans

Rick Ivey Education Details

  • Iowa State University
    Iowa State University
    Information Assurance
  • Limestone College
    Limestone College
    Computer Science
  • Limestone College
    Limestone College
    Business Administration
  • Trident Technical College
    Trident Technical College
    Information Technology

Frequently Asked Questions about Rick Ivey

What company does Rick Ivey work for?

Rick Ivey works for Iowa State University

What is Rick Ivey's role at the current company?

Rick Ivey's current role is Rick Ivey a Graduate Student in Information Assurance and Practictioner.

What is Rick Ivey's email address?

Rick Ivey's email address is iv****@****ail.com

What schools did Rick Ivey attend?

Rick Ivey attended Iowa State University, Limestone College, Limestone College, Trident Technical College.

What skills is Rick Ivey known for?

Rick Ivey has skills like Security, Network Security, Computer Security, Servers, Information Security, Information Assurance, Network Administration, Computer Repair, Firewalls, Information Security Management, Vulnerability Assessment, Computer Network Operations.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.