Travis Green

Travis Green Email and Phone Number

Cybersecurity Researcher | CISSP, GCIA, CCSP @ Corelight
Travis Green's Location
Denver, Colorado, United States, United States
Travis Green's Contact Details

Travis Green work email

Travis Green personal email

About Travis Green

A lifelong learner with 20+ experience in cyber security and enterprise IT. My passion is exploring the intersection of threat intelligence, detection, and machine learning. More at https://travisgreen.net

Travis Green's Current Company Details
Corelight

Corelight

View
Cybersecurity Researcher | CISSP, GCIA, CCSP
Travis Green Work Experience Details
  • Corelight
    Security Researcher
    Corelight Feb 2024 - Present
    San Francisco, Ca, Us
    Member of the fantastic Corelight Labs team
  • Operium
    Principal Cybersecurity Researcher
    Operium Jan 2023 - Present
    - Performing cloud DFIR on Azure- Determining incident root cause- Reporting findings & providing recommendations
  • Cluster25
    Principal Cybersecurity Researcher
    Cluster25 Feb 2022 - Dec 2022
    - Lead team members performing pathfinding and threat hunting- Created new methods of generating threat intelligence data and analysis- Lead the team's effort to leverage platform data for intelligence collection and analysis- Joined the software development team to implement platform features and inform product strategy- Designed and implemented the security data pipeline- Created methods and tools for the presentation of security data
  • Protectwise, Inc. (Acquired By Verizon)
    Principal Threat Intelligence Analyst
    Protectwise, Inc. (Acquired By Verizon) Nov 2019 - Mar 2022
    Denver, Co, Us
    - Conducted incident response and analyzed intrusions- Employed repeated analyses to monitor threat actor activity and observe the progression of their tactics, techniques, and procedures- Developed a detection system integrating many data sources to accelerate detection time- Produced original threat intelligence and detection logic to capitalize on it- Created a system to analyze, improve and enrich inbound threat intelligence feeds- Collaborated with product & platform teams to address detection efficacy and future direction
  • Emerging Threats - Now Part Of Proofpoint
    Cybersecurity Researcher
    Emerging Threats - Now Part Of Proofpoint Jul 2014 - Jun 2019
    Lafayette, Indiana, Us
    - Analyzed malware and TTPs used by threat actor groups to build detection logic for the EmergingThreats Pro feed- Created threat intelligence artifacts for disk, memory, and network-based indicators via dynamic malware analysis- Assessed new threats and adversary tools and tactics and procedures- Gave training on creating Suricata and Snort IDS signatures.- Mentored junior team members- Created 4,000+ Suricata, Snort, and YARA signatures- Developed Python tools to streamline network activity analysis and intelligence collection
  • Trace Systems
    Security Engineer
    Trace Systems Apr 2013 - Dec 2013
    Vienna, Va, Us
    - Re-engineered network security boundaries to convert strategic sites to a tactical footprint- Developed and executed plan to migrate users to other sites- Managed DIACAP compliance through migrations- Established new vulnerability assessment programs
  • Saic
    Senior Systems Engineer
    Saic Jul 2012 - Jan 2013
    Reston, Va, Us
    - Advised USFOR-A command on projects across the Southwest Asia theater of operations- Deployed intrusion detection sensor grid- Designed and implemented DNS improvments to facilitate IT services in remote areas- Participated significantly in the implementation of a metropolitan sized private cloud service
  • Quantum Research International
    Senior Security Operations Analyst
    Quantum Research International Jan 2009 - Jul 2012
    Huntsville, Al, Us
    - Developed and deployed a robust IDS platform for the Regional Computer Emergency Response Team covering all DoD Southwest Asia networks (100+ Snort sensors)- Created an innovative tap monitoring system to ensure packet acquisition quality at scale- Developed threat hunting procedures to mine network data for anomalies and potential threats- Performed DFIR as a member of the security operations center
  • Exelis (Now Part Of Harris Corporation)
    Senior System Engineer
    Exelis (Now Part Of Harris Corporation) Feb 2007 - Jan 2009
    Us
    - Engineered and deployed clustered Exchange (6K users)- Administered enterprise systems (45K users, 28 sites)- Planned and executed a SAN migration expanding and re-deploying a legacy SAN as tiered backup storage- Expanded the functional area of DoD Common Access Card Login to 15k+ additional users- Led the expansion of Active Directory services across Kuwait, Afghanistan, and Qatar
  • Exelis (Now Part Of Harris Corporation)
    Senior Systems Administrator
    Exelis (Now Part Of Harris Corporation) Dec 2005 - Feb 2007
    Us
    - Lead the systems team for 580th Direct Signal Support Team, supporting 10k+ users- Performed network vulnerability scanning, system backups, hardware & software installs- Deployed clustered Exchange
  • Wildtangent
    Data Center Systems Engineer
    Wildtangent Aug 2001 - Jun 2003
    Redmond, Wa, Us
    - Led the managed services team supporting the webdriver product- Deployed intrusion detection systems- Bootstrapped disaster recovery, web services reporting, test lab, and Active Directory programs
  • Microsoft
    Software Test Engineer
    Microsoft Aug 1999 - Jun 2001
    Redmond, Washington, Us
    - Tested the Windows operating system core- Maintained legacy test lab automation scripts- Participated in a highly effective fault injection testing program led by senior developers

Travis Green Skills

Network Security Security Active Directory Information Security Dns Cissp Disaster Recovery Troubleshooting System Administration Servers Information Assurance Computer Security Security+ Vulnerability Assessment Networking Security Clearance Intrusion Detection Linux System Administration Ids Microsoft Exchange Vmware Operating Systems Firewalls System Deployment Network Administration Information Security Management Dod Microsoft Certified Professional Data Center Diacap Penetration Testing Snort Vmware Esx Software Installation Technical Support Vpn Wsus Hardware Python Bash Linux Group Policy Ceh Information Technology Splunk Nist Linux Security Cyber Security Linux Server Administration Mcse

Frequently Asked Questions about Travis Green

What company does Travis Green work for?

Travis Green works for Corelight

What is Travis Green's role at the current company?

Travis Green's current role is Cybersecurity Researcher | CISSP, GCIA, CCSP.

What is Travis Green's email address?

Travis Green's email address is t@travisgreen.net

What are some of Travis Green's interests?

Travis Green has interest in Stephen Colbert, Shaun White (Snowboarder), Bethesda Softworks, The Onion, Hellowallet, Mark Shuttleworth, Imgur, Sesame Street, Neil Patrick Harris, Toodledo.

What skills is Travis Green known for?

Travis Green has skills like Network Security, Security, Active Directory, Information Security, Dns, Cissp, Disaster Recovery, Troubleshooting, System Administration, Servers, Information Assurance, Computer Security.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.