Aaron Sanderson

Aaron Sanderson

$75/hr
Cyber Security Pro
Reply rate:
-
Availability:
Hourly ($/hour)
Location:
Mt Sterling, Kentucky, United States
Experience:
20 years
Aaron Sanderson www.linkedin.com/in/SecurityAaron Means, KY 40346 •- •-SKILLS Network/Information Security, Computer Network Defense, Threat Hunt, Open Source Intelligence, Incident Response/Management, Information Assurance, Penetration Testing (Kali, Metasploit, Cobalt Strike), Red Teaming (Threat Emulation), Scripting (BASH, PowerShell, Python, SQL), Windows Client/Server CERTIFICATIONS (ISC)2 CISSP (463198) EC-Council CEH (ECC-) Active US DoD Top Secret/SCI, with current SSBI RELEVANT PROFESSIONAL EXPERIENCE Janus Associates Senior Penetration Tester/Threat Analyst/Security Consultant (11/2020 - 05/2025) Remote Security Consultant and Penetration Tester with Janus Associates. Assisting clients in analyzing technical environments, helping them understand information security problems and methods of solving each. Conducting technical penetration testing in client sites. Performing gap analyses of client environments in compliance with accepted security frameworks and compliance requirements. Preparation of technical reports containing information security test results and analysis. Utilize Open Source Intelligence to provide a wholistic picture of risk to clients. Conduct Threat Hunts, Incident Response, and Forensic Analysis on behalf of customers and communicate risk using NIST 800 series, MITRE ATT&CK, and the Cyber Kill Chain to stakeholders and executives. Aermor Red Team Operator/Penetration Tester/Threat Analyst (11/2019 - 10/2020) Worked with the Navy Red Team (one of nine NSA Certified DoD Red Teams) to provide Cyber Threat Emulation to Fleet, Command, and Joint Exercises during pre-deployment training, acquisition program assessments, and operational readiness assessments. Act as a penetration tester using current threat techniques as part of an opposition force team to scan, identify analyze and exploit vulnerabilities, establish persistence, escalate privileges and create effects on target systems, under clear rules of engagement with formal approval and authorities. Utilize Open Source, Commercial, and Government reporting on emerging tools, techniques, and procedures used by the PenTesting community and Advanced Threat Groups to create focused training and threat campaign plans using the MITRE ATT&CK framework. Provide resident subject matter expertise, advice and mentorship to DoD enlisted pentesters. Apogee Engineering Penetration Tester (12/2018 - 11/2019) Analyze the results from automated web testing tools to validate findings, determine their business impact, and eliminate false positives. Demonstrate expertise with website scanning and exploitation tools such as but not limited to: HP WebInspect, Burp Suite, etc. Support execution of and help in development of TTPs for website penetration testing or Blue Teaming. Use commercial and open source network cyber assessment tools (e.g. Nmap, Metasploit, and Nessus). Exploit common vulnerabilities and misconfigurations associated with common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, SQL, etc.), and network security services (PKI, HTTPS, etc.). Produce written reports and briefs on the results of penetration tests. Conduct planning and execute Blue Teaming, Penetration Testing, and/or Capture the Flag events. Research various cyber actors' TTPs, organizational structures, capabilities, personas, and environments, and integrate findings into Cyber Blue Teaming or penetration test operations. Develop and utilize testing methodology for threat emulation and vulnerability validation. Aermor Cyber Forensic Analyst (08/2018 - 12/2018) Network Forensic Analyst augmenting Cyber Defense Command watch floor (SOC/NOC) capabilities. Utilized Open Source and Proprietary IDS (Snort), IPS, and SEIM (Splunk) to conduct Threat Hunting and develop incident reporting. EWA Warrior Services Red Team Operator/Penetration Tester/Threat Analyst (03/2018 - 08/2018) Served on the Navy Red Team with the same duties as identical position with Aermor. Army National Guard/Army Reserve Master Intelligence Sergeant/All-Source Intelligence Analyst (35F/35Z) (11/2001 - Present) Lead, Train and Mentor teams and units of 5 to 150 Soldiers in Garrison, Field, and when Deployed. Supervise the receipt, analysis, dissemination, and storage of intelligence information from Open and Closed reporting. Develop intelligence in support of domestic and overseas missions as a uniformed service member. Supervises the Intelligence Cycle. Quality controls analysis performed by subordinates. Conduct Annual Physical Security inspections and Threat Vulnerability Assessments. Symantec Principal Security Consultant (12/2013 - 03/2018) Resident Consultant acting as staff augmentation to a DOD contract providing expert level assistance with the full suite of Symantec Enterprise Software and Hardware (Endpoint Protection, Mail Security for Exchange, Mail Gateway, Endpoint Encryption, Scan Engine, Data Center Protection, LiveUpdate Administrator, Security Information Manager) to protect and manage critical assets. Duties include: perform assessment, design, implementation, incident planning and forensic services for a global enterprise network (over 250,000 endpoints) while remaining in compliance with applicable regulations and policies. Use standard Microsoft (PowerShell, WinDBG, SQL, SysInternals) and Open Source (WireShark, NMap) tools to quickly determine root cause and remediation of multi-vendor incidents. Served as a subject matter expert on emerging vulnerabilities and threat actors using Closed and Open Source reporting. Senior Business Critical Services Remote Product Specialist (05/2012 - 12/2013) Delivered a polished, high-touch level of technical product support to a portfolio of high profile and high impact customers while managing a customer’s support experience. Serve as a trusted advisor and subject matter expert to assist customer with securing their environment, complying with applicable regulations, responding to security incidents, and use Security Assessment tools (NMAP, Nessus, Metasploit, BASH, Python) to demonstrate potential risk to customer leadership. Participate in, and lead activities (training, mentoring, projects, etc.) to help strengthen the technical abilities of peers and other teams. Drive continued self-development in both technical and professional areas to optimize effectiveness in role. Additionally, served as an Incident Manager for Symantec Business Continuity Program. BCS Remote Product Specialist (04/2008 - 05/2012) Senior Technical Support Analyst (06/2005 - 04/2008) Technical Support Analyst (08/2004 - 06/2005) Delivered enterprise customer support for Symantec Security Products to include AntiVirus, Firewall, AntiSpam, and Content Filtering; on Windows and Linux platforms.
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.