Travis Green work email
- Valid
Travis Green personal email
- Valid
A lifelong learner with 20+ experience in cyber security and enterprise IT. My passion is exploring the intersection of threat intelligence, detection, and machine learning. More at https://travisgreen.net
-
Security ResearcherCorelight Feb 2024 - PresentSan Francisco, Ca, UsMember of the fantastic Corelight Labs team -
Principal Cybersecurity ResearcherOperium Jan 2023 - Present- Performing cloud DFIR on Azure- Determining incident root cause- Reporting findings & providing recommendations -
Principal Cybersecurity ResearcherCluster25 Feb 2022 - Dec 2022- Lead team members performing pathfinding and threat hunting- Created new methods of generating threat intelligence data and analysis- Lead the team's effort to leverage platform data for intelligence collection and analysis- Joined the software development team to implement platform features and inform product strategy- Designed and implemented the security data pipeline- Created methods and tools for the presentation of security data -
Principal Threat Intelligence AnalystProtectwise, Inc. (Acquired By Verizon) Nov 2019 - Mar 2022Denver, Co, Us- Conducted incident response and analyzed intrusions- Employed repeated analyses to monitor threat actor activity and observe the progression of their tactics, techniques, and procedures- Developed a detection system integrating many data sources to accelerate detection time- Produced original threat intelligence and detection logic to capitalize on it- Created a system to analyze, improve and enrich inbound threat intelligence feeds- Collaborated with product & platform teams to address detection efficacy and future direction -
Cybersecurity ResearcherEmerging Threats - Now Part Of Proofpoint Jul 2014 - Jun 2019Lafayette, Indiana, Us- Analyzed malware and TTPs used by threat actor groups to build detection logic for the EmergingThreats Pro feed- Created threat intelligence artifacts for disk, memory, and network-based indicators via dynamic malware analysis- Assessed new threats and adversary tools and tactics and procedures- Gave training on creating Suricata and Snort IDS signatures.- Mentored junior team members- Created 4,000+ Suricata, Snort, and YARA signatures- Developed Python tools to streamline network activity analysis and intelligence collection -
Security EngineerTrace Systems Apr 2013 - Dec 2013Vienna, Va, Us- Re-engineered network security boundaries to convert strategic sites to a tactical footprint- Developed and executed plan to migrate users to other sites- Managed DIACAP compliance through migrations- Established new vulnerability assessment programs -
Senior Systems EngineerSaic Jul 2012 - Jan 2013Reston, Va, Us- Advised USFOR-A command on projects across the Southwest Asia theater of operations- Deployed intrusion detection sensor grid- Designed and implemented DNS improvments to facilitate IT services in remote areas- Participated significantly in the implementation of a metropolitan sized private cloud service -
Senior Security Operations AnalystQuantum Research International Jan 2009 - Jul 2012Huntsville, Al, Us- Developed and deployed a robust IDS platform for the Regional Computer Emergency Response Team covering all DoD Southwest Asia networks (100+ Snort sensors)- Created an innovative tap monitoring system to ensure packet acquisition quality at scale- Developed threat hunting procedures to mine network data for anomalies and potential threats- Performed DFIR as a member of the security operations center -
Senior System EngineerExelis (Now Part Of Harris Corporation) Feb 2007 - Jan 2009Us- Engineered and deployed clustered Exchange (6K users)- Administered enterprise systems (45K users, 28 sites)- Planned and executed a SAN migration expanding and re-deploying a legacy SAN as tiered backup storage- Expanded the functional area of DoD Common Access Card Login to 15k+ additional users- Led the expansion of Active Directory services across Kuwait, Afghanistan, and Qatar -
Senior Systems AdministratorExelis (Now Part Of Harris Corporation) Dec 2005 - Feb 2007Us- Lead the systems team for 580th Direct Signal Support Team, supporting 10k+ users- Performed network vulnerability scanning, system backups, hardware & software installs- Deployed clustered Exchange -
Data Center Systems EngineerWildtangent Aug 2001 - Jun 2003Redmond, Wa, Us- Led the managed services team supporting the webdriver product- Deployed intrusion detection systems- Bootstrapped disaster recovery, web services reporting, test lab, and Active Directory programs -
Software Test EngineerMicrosoft Aug 1999 - Jun 2001Redmond, Washington, Us- Tested the Windows operating system core- Maintained legacy test lab automation scripts- Participated in a highly effective fault injection testing program led by senior developers
Travis Green Skills
Frequently Asked Questions about Travis Green
What company does Travis Green work for?
Travis Green works for Corelight
What is Travis Green's role at the current company?
Travis Green's current role is Cybersecurity Researcher | CISSP, GCIA, CCSP.
What is Travis Green's email address?
Travis Green's email address is t@travisgreen.net
What are some of Travis Green's interests?
Travis Green has interest in Stephen Colbert, Shaun White (Snowboarder), Bethesda Softworks, The Onion, Hellowallet, Mark Shuttleworth, Imgur, Sesame Street, Neil Patrick Harris, Toodledo.
What skills is Travis Green known for?
Travis Green has skills like Network Security, Security, Active Directory, Information Security, Dns, Cissp, Disaster Recovery, Troubleshooting, System Administration, Servers, Information Assurance, Computer Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial