Security
1 / IT Security Manager
I worked full time as an IT Security Manager for a Casino/Resort environment that was not only under strict gaming regulations from the National Indian Gaming Commission, local gaming commission, and state regulations and compacts, but also under Sarbanes Oxley and PCI regulations. This extremely regulated environment provided many more challenges that you might find in your average enterprise.
​
While working as the IT Security Manager I helped establish a full security program with complete policies, procedures, and training to help us to meet all the gaming commission requirements while also reaching PCI and SOX compliance for the first time for the organization. This included reducing major audit findings to 0% and minor audit findings by 95% by the time I left the company while also eliminating the companies usage of outside cyber security consultants with the exception of required outside auditors. There was also no breaches or other security incidents during my time as security manager.
​
2 / Security Consultant
While working for managed service provider and value added reseller, I consulted with many companies on security initiatives and projects. Some of the consulting work I performed is below:
-
Vulnerability assessments - external and internal with full reports provided to the customer
-
Vulnerability remediation work
-
Vulnerability management
-
Patch management
-
Disaster recovery and business continuity
-
General security posture analysis and reporting
-
PCI and HIPPA compliance
-
Control and process consulting
-
Public and private cloud security
-
Technical/infrastructure security including firewall, IPS, EDR, MFA, DNS/URL filtering, netflow analysis, wireless security, RADIUS, IAM, Active Directory
​
3 / IAS Log Parser
While working as a full time security manager, at the time there was no applications or scripts available to parse and make since of Microsoft IAS/NPS logs. This was the backend RADIUS server for VPN authentication, and thus it was important to be able to easily be able to make since of the logs so we could easily determine if attempts were successful or failures, what the failure reason was, and if there was any trends to indicate a potential account compromise or brute force attack.
I decided to develop my own application using C# and the .NET framework. This was a GUI application that would allow me to open a single IAS log file, or an entire folder of files. It would then parse out extraneous entries, and then take the relevant success or failure entries and match up the numerical response code with success or failure. If a failure, it would also match up the code with the actual failure reason. It would then take all the data and output it in a .NET grid/table that had all the relevant information, such as date/time, username, success/failure, and failure reason. This grid was sortable and filterable.
Overall it was a application that the team and I used on a regular basis.