Rick Ivey Email and Phone Number
Rick Ivey work email
- Valid
Rick Ivey personal email
- Valid
Specialties: Network Administration, Network Technical Support, Information Security Policy Review, Vulnerability Testing, Information Technology/Security Auditing, Information Security Awareness, Nessus, Nmap, Wireshark, TCPDump, Retina, Cain & Able, John the Ripper, Netcat, Netstumbler, Kismet, Snort, Metasploit, Dos 6.11, Windows 3.1x-2008, Linux, Netware 5 & 6. Mac OS
-
Me Information Assurance StudentIowa State University Aug 2009 - PresentAmes, Iowa, UsStudent at Iowa State. Currently enrolled in their Master's of Engineering in Information Assurance program. -
Network Security ConsultantSecqurance Apr 2009 - PresentAssist local businesses with Information Security Awareness programs. Migrating older server technology to newer. Lead on Blackberry Professional/Enterprise Server Installs & Support. Lead Anti-Virus/Malware Install & Support. Remote Support for clients that do not have a full time Network Admin on staff.
-
Sansfire 2010: Course FacilitatorSans Institute Jun 2010 - Jun 2010Rockville, Maryland, Us -
Sans Network Security East 2010: Course FacilitatorSans Institute Jan 2010 - Jan 2010Rockville, Maryland, UsAssisted with displays, signage, setup, courseware, inventory and SANS@Night events. SANS Network Security East 2010 was held at the Sheraton in New Orleans, LACourse Facilitator for SEC553: Metasploit for Penetration Testing which was taught by Paul A. Henry.Course Facilitator for AUD507: Auditing Networks, Perimeters, & Systems which was taught by David Hoelzer.Course Facilitator for SEC440: 20 Critical Security Controls: Planning, Implementing and Auditing which was taught by Dr. Eric Cole, PhD.AUD507 Description: One of the most significant obstacles facing many auditors today is how exactly to go about auditing the security of an enterprise. What systems really matter? How should the firewall and routers be configured? What settings should be checked on the various systems under scrutiny? Is there a set of processes that can be put into place to allow an auditor to focus on the business processes rather than the security settings? All of these questions and more will be answered by the material covered in this course. Course prepares the student to earn the GIAC Systems & Network Auditor (GSNA)SEC440 Description: This course helps you master specific, proven techniques and tools needed to implement and audit the Top Twenty Most Critical Security Controls. (All descriptions from www.sans.org) -
Sans Network Security West 2009: Course FacilitatorSans Institute Sep 2009 - Sep 2009Rockville, Maryland, UsAssisted with displays, signage, setup, courseware, inventory and SANS@Night events. SANS Network Security West 2009 was held at the Manchester Grand Hyatt Hotel in San Diego, California.Course Facilitator for AUD429: IT Security Audit Essentials which was taught by James Tarala.Course Facilitator for MGT512: SANS Security Leadership Essentials for Managers with Knowledge Compression which was taught by Stephen Northcutt.AUD429 Description: In the IT Security Audit Essentials course, we feel that we have put together a very strong audit training program, giving both audit theory and strong technical details. It covers the essentials of security, compliance, and IT auditing -- everything you need, nothing you don't. As each topic is discussed in the class, we will strive to first teach the underlying theories and then explain how and what about these topics require the attention of an auditor or compliance officer.MGT512 Description: This completely updated course is designed to empower advancing managers who want to get up to speed quickly on information security issues and terminology. You don't just learn about security, you learn how to manage security. The diligent manager will learn vital, up-to-date knowledge and skills required to supervise the security component of any information technology project. Essential security topics covered in this management track include: Network Fundamentals and Applications, Power, Cooling and Safety, Architectural Approaches to Defense in Depth, Cyber Attacks, Vulnerability Assessment and Management, Security Policies, Contingency and Continuity Planning, Awareness Management, Risk Management Analysis, Incident Handling, Web Application Security, Offensive and Defensive Information Warfare, culminating with our Management Practicum. (All descriptions from www.sans.org)Course prepares the student to earn the GIAC Security Leadership Certification (GSLC). -
Sansfire 2009: Mgt414 Course FacilitatorSans Institute Jun 2009 - Jun 2009Rockville, Maryland, UsCourse Facilitator for MGT414: SANS +S Training Program for the CISSP Certification Exam at SANSFIRE 2009. This event was held at the Hilton in Baltimore, Maryland and was taught by Eric Conrad.Assisted with displays, setup, courseware, bookstore sales/inventory and SANS@Night events.Course prepares the student to earn the ISC(2) CISSP and also the GIAC Information Security Professional (GISP). -
Sansfire 2009: Sec561 StudentSans Institute Jun 2009 - Jun 2009Rockville, Maryland, UsAttended SEC561: Network Penetration Testing: Maximizing the Effectiveness of Reports, Exploits, and Command Shells at SANSFIRE 2009. This event was held at the Hilton in Baltimore, Maryland and was taught by John Strand.Course Description: This one-day session builds on the principles of SANS Security 560 with additional discussion and numerous hands-on exercises designed to help attendees make the most of their penetration tests. The course describes using Metasploit functionality to transform payloads into executable programs that are highly useful in penetration tests. We then look at altering the executables with Metasploit's encode functionality, packing them to evade detection, and then loading them onto USB tokens for autoplay attacks on Windows machines, all done in a detailed hands-on exercise. We also address how to write penetration testing reports that have maximum effectiveness in helping an organization to understand its risks based on the findings of a penetration test, motivating positive changes in the security stance of the target organization. The session concludes with a detailed discussion of the critical post-exploitation phase of a penetration test, leveraging built-in Unix, Linux, and Windows tools such as /dev/tcp, telnet clients, and ftp to launch port scans, create backdoor shells, and move files, all techniques that can be directly applied in real-world penetration tests. (Description from www.sans.org) -
Network EngineerKotori Technologies, Llc Feb 2008 - Mar 2009
-
Network InstructorBeta Tech, Now Known As Centura College Oct 2007 - Feb 2008
-
Corporal (E4): Ammunition & Explosives Technician/Information System SpecialistUnited States Marine Corps Jun 2001 - Nov 2006Washington, Dc, UsFire Team Leader: Responsible for a four-Marine team in guidance with Marine Corps SOP for managing a rifle team as taught in MCT. Administrative duties involve keeping members aware of changes to Drill Schedule and up to date with new information with the Marine Corps Organization.Information System Specialist (MOS 0651): Responsible for configuration and management of both stand-alone and client-server environment computers in support of NMCI.Ammunition & Explosives Technician (MOS 2311): Attached to command to continue with the mission of retrograding ammunition from the Marine Corps and preparing it to be turned over to the United States Army. Supervised all transactions and accounted for personal. Document transactions to supply all combat units with right allocations of ammunition and explosive ordinance to move forward into Iraq from Kuwait (Camp Coyote). Documented all receipts of ammunition ordinances, expended or received. Processed all necessary turn-ins and retrograde from Iraq (LZ Chesty) to ship back to Kuwait in excess of 250,000 rounds of various ammunition valued at over 500 million dollars. One of six from 250 chosen to be the first into Iraq to escort 150 vehicles for re-supplies. Responsible for establishing initial ammunition re-supply points at LZ Basilone and LZ Chesty in Iraq. Corporal of the guard for guarding numerous prisoners of war. -
System Security Analyst IEma, Inc Apr 2002 - Jan 2003St. Paul, Mn, UsProvided data entry and on-line help desk support for the INFOSEC Technical Assistance Center (ITAC) Help Desk located at SPAWAR Systems Center, Charleston, SC. Duties include maintaining and providing help desk operation services to SPAWAR Fleet customers, analysis for proper routing and follow up of technical issues for SSCC resolutions.Provided telephone Information Security (INFOSEC) technical support for the ITAC team. Main point of contact for Navy and Department of Defense (DoD) Computer Security (COMPUSEC) and Communications Security (COMSEC) regulations regarding personnel, Certification and Accreditation (C&A), remanence, DODIIS guidance, approved COMPUSEC products, World Wide Web (WWW) page development, Internet usage, phone usage, communications, and media and information transfer. Main POC for multiple PC security related issues at the help desk. Assists with Electronic Key Management Systems (EKMS) and firewall systems by mailing computer based training and assisting with patches. Load and help users with Toolbox, Norton Utilities, and BC-Wipe software. -
Service TechnicianBest Buy Sep 1998 - Oct 2002Richfield, Minnesota, UsDiagnose & solve computer problems; Routine setups and testing of all new computers; Maintaining all computers in the PC Department as fully functional at all times; Consultation on upgrade possibilities with customers; Software and Hardware conflicts, Installation of peripherals and hardware; Ensuring customer satisfaction with prompt knowledgeable service. -
Computer Operator V (Contract Title)Dyncorp International Nov 1999 - Nov 2001Mclean, Virginia, UsPC/LAN Technician & AWRDs Database Analyst: Assist network Administrator and provide network, hardware, software troubleshooting support for 350+ employees workstation network for the Navel Weapons Stations, Charleston, SC. Network is NT based with Netware 4.11 as the Intranet. In the process of migrating to Netware 5; Assist in Help Desk work and troubleshooting; Repairing and diagnosing computers on the network to determine whether software or hardware and find reasonable solution quickly. Familiar with the AWRDs database. Audio/Visual Specialist: Managed the upper-managements' visual presentations for US Army. Completed numerous MS Power Point presentations for higher dignitaries. Provided support and the set up of Barco Projectors for presentations. Created Computer Security Briefing Power Point presentations.
Rick Ivey Skills
Rick Ivey Education Details
-
Iowa State UniversityInformation Assurance -
Limestone CollegeComputer Science -
Limestone CollegeBusiness Administration -
Trident Technical CollegeInformation Technology
Frequently Asked Questions about Rick Ivey
What company does Rick Ivey work for?
Rick Ivey works for Iowa State University
What is Rick Ivey's role at the current company?
Rick Ivey's current role is Rick Ivey a Graduate Student in Information Assurance and Practictioner.
What is Rick Ivey's email address?
Rick Ivey's email address is iv****@****ail.com
What schools did Rick Ivey attend?
Rick Ivey attended Iowa State University, Limestone College, Limestone College, Trident Technical College.
What skills is Rick Ivey known for?
Rick Ivey has skills like Security, Network Security, Computer Security, Servers, Information Security, Information Assurance, Network Administration, Computer Repair, Firewalls, Information Security Management, Vulnerability Assessment, Computer Network Operations.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial