Ryan Erwin Email and Phone Number
Ryan Erwin work email
- Valid
Ryan Erwin personal email
As a Senior Information Security Engineer at White Cap, I have over 10 years of experience in information security and support services across diverse platforms, architectures, and protocols. I am certified in CompTIA Network+ and Microsoft Technology Associate: Windows Server Administration Fundamentals, and I have developed multiple skills in web application security, malware analysis, incident response, and cyber awareness training.My mission is to design, implement, and manage effective and customized networking and security solutions that meet the unique needs and challenges of each client. I work with various internal and external stakeholders, such as server administrators, network administrators, application developers, third-party vendors, and end-users, to coordinate and execute vulnerability scans, remediation plans, and security policies. I also leverage a range of cybersecurity tools and techniques, such as Chronicle, Tenable.io, CrowdStrike Falcon, Proofpoint TRAP, Microsoft Defender, to evaluate, respond, and mitigate alerts and threats. My goal is to ensure seamless operations and fortified security measures for web applications and sites, while also educating and empowering users on best practices and risk mitigation.
Performance Food Group
View- Website:
- theamyntagroup.com
- Employees:
- 266
-
Sr. Vulnerability Management AnalystPerformance Food GroupKeller, Tx, Us -
Cyber Security EngineerSelf-Employed Apr 2024 - Present
-
Information Security EngineerAmynta Group Dec 2023 - PresentBedford, Texas, United States -
Senior Information Security EngineerWhite Cap Aug 2022 - Present -
Web Application EngineerNch Corporation Mar 2022 - Aug 2022• Develops Policy on Vulnerability management and Web application security for the company’s custom internal critical applications • Develops runbooks for step-by-step guidance on strategic Scan Policy creation and scheduling • Works with 3rd party Vendors for Vulnerability Scans and Remediation plan execution • Works with functions team leads from Server Administrators/Network administrators/Application Developers• Coordinates the web application and web site security program• Conducts web application and web site vulnerability security scans and tracks remediation tasks (NetSparker)• Coordinates Scan depth based off risk mitigation tool • Creates user cyber awareness training and tracks effectiveness• Coordinates and tracks cyber security remediation task based on OWSAP Top 10 • Coordinates with 3rd party vendor risk assessments -
Cyber Security AnalystHuntington National Bank Oct 2021 - Mar 2022Participates in the day-to-day security operations monitoring and response from the Cybersecurity Operations Center.• Performs malware analysis, reverse engineering, and de-obfuscation techniques• Evaluates, responds, and mitigates alerts that originate from the SIEM and the Cybersecurity product suite, e.g. NGFWs, IDS/IPS, Anti-virus, Web Application Firewalls, NAC Solution, Azure, MCAS, and Office 365• Implements or recommend mitigations including the creation and development of new alerts and rules within the various cyber security tools.• Able to analyze and identify malicious activity during the various attack stages.• Maintaining a high level of technical expertise on Cyber Security defense-in-depth technology and best practices by performing ongoing research and engagement to maintain awareness of industry trends, best practices.• Collaborates with the Cyber Security Engineering and IT Operations teams• Familiar with common attack vectors, DDoS attacks, Phishing, web & application attacks, and malware• Knowledge of common critical network protocols and layer 7 technologies such as SMTP, HTTP, HTTP/S, SSL/TLS, DNS, FTP, SSH, and others• Familiar with a SIEM platform and various cyber security technologies such as EDR, AV, IDS/IPS, and WAFs• Familiarity with advanced persistent threats and their tactics, techniques, and procedures• Familiarity with the incident response Kill Chain• Utilize the EDR tool CrowdStrike to investigate malicious artifacts found on end point devices with accuracy. -
Cyber Defense Incident ResponderToyota Tsusho Corporation Mar 2020 - Oct 2021Incident Detection Analyst March,2020-OCT 2021• Conducts Event Detection, Incident Triage, Incident. Handling, Hunting activities by leveraging our detection/response platforms.• Continuously monitors levels of service as well as interpret and prioritize threats through use of cyber threat intelligence, intrusion detection systems, firewalls and other boundary protection devices, and any security incident management products deployed• Provide 24x7 incident detection and monitoring service, and performance report on regular basis.• Escalates cyber security events according to playbook and standard operation procedures (SOPs).• Remediate non-compliance with technical and security requirements.• Escalates high or critical severity level incidents to Incident Investigators. • Assists with containment of threats and remediation of environment during or after an incident.• Performs triage of service requests from customers and internal teams.• Develop and implement remediation plans in response to incidents.• Update’s procedures and configure tools for Monitoring Analysts consumption• Consumes threat intelligence and disseminate findings to relevant parties• Conducts hunting activities based on internal and external threat intelligence -
Cyber Security AnalystTexas Health Resources Sep 2017 - Mar 2020•Develop and integrate security incident response procedures and manages system-wide security incident response plan using the NIST process framework and IBM’s Resilient Ticketing system•Engineer, deploy and operate incident response tools such as Q-Radar, Trap X, and Perch, Snort, Azure, MCAS, and Office 365•Coordinate annual cybersecurity exercise purple Team events •Perform computer forensic response, investigation, and reporting; coordinate forensic service activities with other departments such as compliance, human resources and legal•Design, configure, analyze, and tune vulnerability management/threat management systems using Cylance Endpoint Security, Firemon, and Cisco Content security management console, Microsoft defender ATP, Microsoft cloud application security suite. (MCAS)•Coordinate threat activities with managed security operations services, external agencies, and information sharing organizations•Actively research new and emerging threats; maintain enterprise threat matrix and inventory of ongoing vulnerabilities, exploits and security incidents using Recorded Future service platform•Work with system owners, systems administrators, and vendors on implementing secure configurations using ZingBox for medical devices •Develop and distribute threat reports and alerts to stakeholders and senior leadership using internal ticketing •Perform vulnerability scanning and coordinates independent internal and external penetration tests using Attack IQ, and Nexpose •Troubleshoot server/storage/network related issues impacting business and clinical applications/services using PuTTY, VMware vSphere Client •Analyze/evaluate and remediate security events across the enterprise using Tableau, Apex data collection, and RSAM ticketing System•Update incident response scenarios and procedures to adapt to changing organization/cultural/system configuration -
Information Technology SpecialistTexas Army National Guard Oct 2012 - Nov 2018Experience performing routine tasks of establishing or resetting of accounts, passwords and unlocking accounts.· Performing basic computer system checks for viruses, unauthorized materials and security violations.· Providing basic assistance to staff on the operation and functions of computer equipment to include printers, scanners, modems and basic office software.· Providing training to staff on basic computer applications utilized by the agency (i.e., Excel, Adobe, Microsoft Word, PowerPoint, etc.).· Implement Microsoft Exchange Server· Implement Anti-Virus software · Configure a computer to join a domain· Implement VM ware · Knowledge of network systems.· Knowledge of LAN systems.· Knowledge of information security procedures and policies.· Skill in organizing and managing projects· Configure Local Group Policy in Active Directory · Performs backup of Configuration files on a Network Device · Correct a Malfunction on a Local Area Network· Determine a Subnet Using Variable Length Subnet Mask (VLSM)· Perform Hard Drive Imaging· Implement Local area network form a network plan· Configure OSPF on a router · Implement a Dynamic Host Control Protocol Server -
Cyber SecurityDxc Technology Apr 2015 - Oct 2017Plano, Texas -
Cyber Security AnalystHewlett Packard Enterprise Jun 2014 - Sep 2017• Maintained security of network infrastructure and communications systems• Oversaw Information Systems and Network Security view monitoring administration and development of signatures for Intrusion Detection and security information management systems on assigned networks• Utilized IT hardware and software to combat unauthorized access and damage to sensitive and classified data• Researched and developed security requirements in the implementation of new systems and major system revisions• Responsible for the real-time analysis of incoming cyber security alerts using ArcSight ESM and Splunk log analysis • Initial triage and escalation of the alert, as well as the investigation and remediation of all types of potential cyber threats ranging from minor events to major incidents• Played a key role in refining, implementing, and identifying new processes, technologies and solutions; actively shaped the way HP performs cyber security operations • Communicated and coordinated with other HP cyber security teams, internal business units and upper management• Utilized ArcSight Logger to actively threat hunt within the HPI internal network
Ryan Erwin Education Details
-
Information Technology Security -
Information Technology 25B20 Us Army3.8 -
My Computer Carrer.Com3.0
Frequently Asked Questions about Ryan Erwin
What company does Ryan Erwin work for?
Ryan Erwin works for Performance Food Group
What is Ryan Erwin's role at the current company?
Ryan Erwin's current role is Sr. Vulnerability Management Analyst.
What is Ryan Erwin's email address?
Ryan Erwin's email address is ry****@****dxc.com
What schools did Ryan Erwin attend?
Ryan Erwin attended Western Governors University, Information Technology 25b20 Us Army, My Computer Carrer.com.
Who are Ryan Erwin's colleagues?
Ryan Erwin's colleagues are John Stiles, Terence Holt, Mohammad Alam, Stephanie Ramirez, Jennifer Benker, Steve Tucker, Wanda Saunders.
Not the Ryan Erwin you were looking for?
-
Ryan Erwin
Highland Park, Il5gmail.com, orbitmedia.com, orbitmedia.com, communitytax.com, digitaslbi.com5 +184739XXXXX
-
6jaxtechservices.com, yahoo.com, accessiumbc.com, gmail.com, accessiumgroup.com, accessiumgroup.com
3 +171626XXXXX
-
Ryan Erwin
Atlanta, Ga9firstdata.com, gmail.com, comcast.net, cableone.net, ssgi.cc, motorskill.com, yahoo.com, tyco.com, fiserv.com8 +183228XXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial