Jason Taylor work email
- Valid
- Valid
- Valid
Jason Taylor personal email
- Valid
- Valid
I love finding weaknesses in technologies. I am curious and ask “what if” questions to identify and remediate cybersecurity risks.I love learning and mentoring others while sharing the knowledge that I gain from the multiple practical hands-on training platforms that I subscribe to, such as Hack the Box, Try Hack Me, VulnLab, and PentesterLab. I love to read the latest vulnerabilities and exploits and enjoy testing them out in my home lab.I thoroughly enjoy solving problems, even if they aren’t mine. I will gladly help out other departments with my knowledge and skills to assist them in identifying issues and getting them resolved. I want the client/customer (internal or external) to have quick response times and efficient resolution of their issues.Outside of work I enjoy spending time with my family, programming my own IoT devices and 3D printing toys for my kids. As a lifelong learner, some of my favorite learning platforms are:vulnlab.compentesterlab.comhackthebox.comtryhackme.comletsdefend.iocyberdefenders.org
-
Lead Penetration TesterRaxis Oct 2024 - PresentAtlanta, Georgia, Us -
Cyber Security ConsultantRuff Security Llc Mar 2023 - PresentI started Ruff Security LLC after being approached to provide some AWS architecting and security consulting services. This lead into performing some penetration tests and security assessments for a handful of clients. I pride myself in providing high quality vulnerability assessment reports with prioritized guidance and recommendations for my clients. -
Security EngineerFidelity Bank / Oklahoma Fidelity Bank Sep 2023 - Sep 2024Wichita, Ks, UsI was promoted to this position after I suggested a restructuring of our security department to allow for a tiered escalation of duties and provide confidence to internal customers when escalating to multiple analysts.I perform offensive application security testing on internally developed web applications and Python code reviews. I created our initial security oversight processes and executed our 1st internal web application test.I author security assessment reports for applications and network security tests, manage CrowdStrike EDR, and Identity Threat Protection products, and test internal network security with tools like BloodHound, PingCastle, and Responder. I also administer out Tenable.io, Tenable.sc, and Nessus vulnerability scanning infrastructure.I’m also the Tier 3 escalation point for security analysts and other IT stakeholders along with mentoring other Security Analysts and knowledge sharing. -
Senior Information Security AnalystFidelity Bank / Oklahoma Fidelity Bank Nov 2017 - Sep 2023Wichita, Ks, UsI transitioned to the security department upon its creation from an initial Systems Administrator role and investigated phishing email reports and triaged endpoint protection alerts. I served as escalation point for complex issues involving Duo, Cisco Security, and Splunk. Prioritized, remediated, and mitigated identified vulnerabilities, responded to technical incidents and led forensic investigations, and monitored vulnerability news and threat intelligence.We ensured logging compliance, reduced passwords needed, consolidated authentication, and migrated from an on-prem Splunk Enterprise to the Splunk Cloud. -
Cyber Security AnalystEmprise Bank Apr 2017 - Nov 2017UsI always had an interest in cybersecurity and due to my ability to identify security risks within our network, I was promoted to this role.I managed Nessus and Acunetix vulnerability scans and reports. Remediated and mitigated system administration issues for vulnerabilities in the environment. I also created PowerShell scripts to monitor Active Directory password hashes for password re-use policy violations.We bolstered our password security, reduced the need for manual security camera reviews, and implemented a new Imperva Web Application Firewall. -
System AdministratorEmprise Bank Sep 2013 - Apr 2017UsI joined Emprise Bank and managed Active Directory and Group Policy for corporate headquarters and 30+ branch offices. I was responsible for our VMware vCenter infrastructure consisting of over 100 Windows Server VMs and 30+ physical servers at branch locations. I also supported business process automation initiatives with the creation of PowerShell scripts and Lansweeper deployment packages.
Jason Taylor Skills
Jason Taylor Education Details
-
Westwood College - Denver NorthInformation Technology: Major In Systems Security
Frequently Asked Questions about Jason Taylor
What company does Jason Taylor work for?
Jason Taylor works for Raxis
What is Jason Taylor's role at the current company?
Jason Taylor's current role is Lead Penetration Tester | OSCP | PNPT | GCIH | CASP+.
What is Jason Taylor's email address?
Jason Taylor's email address is je****@****ail.com
What schools did Jason Taylor attend?
Jason Taylor attended Westwood College - Denver North.
What are some of Jason Taylor's interests?
Jason Taylor has interest in Networking, Windows Server, Web Development, Linux, Exchange, Automation, Powershell, Scripting.
What skills is Jason Taylor known for?
Jason Taylor has skills like Powershell, Virtualization, Information Security, Security Patch Management, Security, Cybersecurity, Nessus, Tenable.sc, Acunetix, Patch Management, Windows Server, Active Directory.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial