Ron Eddings Email and Phone Number
Ron Eddings work email
- Valid
- Valid
Ron Eddings personal email
- Valid
- Valid
- Valid
Technologists are mental athletes with no off-season. The constant need to learn, improve, and iterate creates friction in the life of technologists, stifling both creativity and innovation. My mission is to inspire, empower and uplift the technology community through knowledge and human stories so that others have the opportunity to reach their set potential. Technology and my life's mission both require a lifetime commitment to learning and teaching. Each opportunity to gain a rare and valuable skill is an opportunity to gain personal and financial freedom. By exploring the intersection between humanity and technology, I hope to help others uncover their potential and realize their freedom.
-
Founder And Executive ProducerHacker Valley MediaAustin, Tx, Us -
Founder & Executive ProducerHacker Valley Media May 2019 - PresentDallas, Texas, UsListen, sponsor, and get featured on our award-winning cybersecurity podcasts & videos.We are a cybersecurity media company with 6 different podcasts and video shows and one mission: to share the most powerful stories in cyber in creative ways. We strive to live outside the bits and bytes of technology and focus on the human element. Our niche shows have something for everyone - from getting started in cyber to red teaming, being a CISO, and cyber marketing. -
Genai Security ResearcherMozilla Aug 2024 - PresentSan Francisco, Ca, Us -
Creative Director, Attack Surface Management SmeAxonius Aug 2021 - Jan 2023New York, Ny, UsResponsible for creating and delivering Attack Surface Management (ASM) training, video, and written content and helped grow the Axonius brand. Also served as a cybersecurity advocate speaking at conferences globally. My team helped Axonius grow from 7% to 21% in aided recall survey. -
Sr. Manager, Detection And ResponseMarqeta, Inc Oct 2020 - Aug 2021Oakland, California, UsAs a detection and response leader, my responsibility is to motivate and inspire team members to create learn, create and innovate. As a result, the Detection and Response team implemented security solutions, policies, and guidelines that helped the organization freely innovate. Outside of technical innovation, my focus was to present security challenges and opportunities as stories for team members to understand and relate to. Other responsibilities include:- Identify, document, and automate security workflows- Provide team members an environment to thrive in- Manage relationships with team members, stakeholders,and vendors- Onboard technology solutions that promote and enhance security for the organization -
Security Architect, Automation ArchitectDemisto Nov 2017 - Oct 2020Santa Clara, California, UsAs a Security Architect, I am responsible for leading technical discussions with clients to help them understand and implement desired security solutions.• Develop and implement Machine Learning models to de-duplicate multiple incidents from a single Malicious campaign in efforts to help reduce Mean Time To Respond (MTTR) for clients and provide customer security and satisfaction.• Research on latest threats and malicious content to create and implement the most effective practices for identifying, alerting, and proactively preventing related incidents via Python/Javascript automation scripts.• Conduct threat-hunting and solution-based procedures training to cross functional staff and collaborate with senior management for the development, optimization and implementation of workflows to establish a cohesive unit.• Provide technical knowledge in software design, management and execution.• Oversee product onboarding, Mentoring and Coaching, and onsite troubleshooting. -
Manager, Security ArchitectPalo Alto Networks Nov 2017 - Oct 2020Santa Clara, California, UsAs a Security Architect leader, I'm responsible for facilitating growth for others and consistently creating a pipeline of security leaders. Our team is highly effective when planning, designing, and implementing security controls for enterprise organizations. In addition, our team of security architects are leaders in creating security policies, standards, and guidelines. During implementation, our team assists enterprise organizations with the following:• Detection engineering• Case management• Creating and automating incident responses processes • Creating automation via Python and Javascript• Threat Intel Management -
Threat IntelligencePalo Alto Networks Nov 2017 - Oct 2020Santa Clara, California, UsAs a Security Architect, I assist organizations collect, assess, and apply threat intelligence to security controls. I've leveraged threat intelligence to provide context for security threats, threat actors, exploits, malware, vulnerabilities, and compromised indicators. Additionally, I've applied automation efforts to threat intelligence to further reduce the mean time to detect (MTTD) and mean time to respond (MTTR). -
Security Orchestration, Automation And Response (Soar)Palo Alto Networks Nov 2017 - Oct 2020Santa Clara, California, UsAs a Security Architect, I've implemented and scaled security automation for production workflows. Leveraging SOAR products and methodologies, I've assisted enterprise organizations with case management, automation/orchestration, incident response and chatops. I've created SOAR playbooks for the following use cases:• Phishing• Malware Infection• Data Loss Prevention (DLP)• Employee onboard/offboarding• Destroy/Recreate Cloud Instance• Suspicious User Login -
Cyber Fusion Analyst (Threat Intel And Intrusion Prevention)Intel Corporation Sep 2016 - Nov 2017Santa Clara, California, UsAs a Cyber Fusion Analyst, I maintained real-time awareness of cyber activity and potential vulnerabilities, malware, and threats that have the potential to affect users and the system. Collected, synthesized, summarized data and incident reports.Key Accomplishments:• Gathered and interpreted internal and open-source threat intelligence to successfully complete the building, optimization, and automation of the threat research platform in order to prevent further threats.• Provided Basic and Advanced-level Threat Identification, hunting, analysis, and training to both the Security Operations Center (SOC) and the Advanced Persistent Threat (APT) hunt team.• Created Threat Intel Framework API and User Interfaces (UI) by leveraging the Sails JS, Node JS, and MySQL.• Participated in Agile and Extreme Programming (XP) activities for further skill acquisition and advancement.• Created several Application Programming Interfaces (APIs) to interact with multiple security products in a single query.• Exposed to a dynamic, fast-paced environment working to anticipate, identify, and respond to cyber attacks. -
Security ResearcherMcafee Dec 2013 - Mar 2016San Jose, California, UsAs a Security Researcher, I researched on the latest threats and Malware Trends to develop ways to identify and resolve them; Studied the structures of Malicious software and gained insight of exploits, malicious command and control mechanisms, and malicious tactics, techniques and procedures (TTPs).Key Accomplishments:• Created a framework that enumerates devices on IPv6 enabled networks. • Utilized, analyzed, and applied machine learning models to data samples to predict malicious binaries.• Developed, executed, and maintained a framework that is able to ingest Android binaries and return indicators of malicious activity; Leveraged Interactive Disassembler (IDA Pro) to perform static analysis of binaries.• Authored internal research papers focused on identifying clean, suspicious, and malicious Android applications.• Installed and managed ElasticSearch and MongoDB instances to store threat data to help prevent future threats. -
Offensive Security Engineer And AnalystBooz Allen Hamilton May 2010 - Dec 2013Mclean, Va, UsPerformed research, analysis, and reconstruction of security controls in efforts to find vulnerabilities and perform exploitation- Provided Subject Matter Expert (SME) security analysis and protocol analysis mentorship to clients.- Facilitated analyst focus groups and discussions between intelligence community groups- Instructed and mentored security engineers and analysts to create Python scripts to quickly analyze log data.- Utilized Open source and classified material to locate high-interest communications networks in efforts to identify security vulnerabilities.
Ron Eddings Skills
Ron Eddings Education Details
-
Western Governors UniversityInformation Technology - Security -
Anne Arundel Community CollegeInformation Systems Security
Frequently Asked Questions about Ron Eddings
What company does Ron Eddings work for?
Ron Eddings works for Hacker Valley Media
What is Ron Eddings's role at the current company?
Ron Eddings's current role is Founder and Executive Producer.
What is Ron Eddings's email address?
Ron Eddings's email address is ro****@****ail.com
What schools did Ron Eddings attend?
Ron Eddings attended Western Governors University, Anne Arundel Community College.
What skills is Ron Eddings known for?
Ron Eddings has skills like Network Security, Information Security, Computer Security, Security, Vulnerability Assessment, Information Assurance, Computer Forensics, Information Security Management, Cissp, Penetration Testing, Networking, Linux.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial