1. Ian Powers
3161 Willow Creek Road, Prescott, AZ 86301 Apt. 132 | 602- 427-7404 | ianspowers@gmail.com
OBJECTIVE To obtain a position in the field of information and cyber security
EDUCATION Embry-Riddle AeronauticalUniversity (ERAU), Prescott, AZ
Bachelor of Science in Cyber Security & Intelligence December 2016
CGPA: 3.833
Dean’s List: Fall 2013, Spring 2014, Fall 2014, Spring 2015, Fall 2015
Dobson High School
High School Diploma May 2013
Graduated top 20 in class
TECHNOLOGY Knowledgeable utilizing HTML, CSS, Javascript, ANSI Standard C Programing, C++, Python, Apache,
AccessData Forensic Toolkit, Nessus, Microsoft Windows, Outlook, Word, Excel, PowerPoint, Project,
Kali Linux and programs within the Kali Linux Suite: Armitage, Metasploit, Nmap, Aircrack-ng,
Wireshark, Maltego, Reaver, Hydra, John the Ripper, Snort, Sqlmap, Scapy, and Ettercap
RELEVANT Intro to Cyber Security Malware Analysis
COURSEWORK Intro to Computer Forensics Quantitative Methods I
(* = currently enrolled) Computer Science I, II Introductory Physics I, II
Principles of Management Intro to Computer Networks
Studies in Global Intelligence I Advanced Computer Based Systems
Certified Ethical Hacker Security Fundamentals
Operating Systems Intro to Discrete Structures
*Securing Computer Networks *Network Security (Cryptography)
*Intelligence and Technology *Cyber Capstone Project
RELEVANT CactusCon
EXPERIENCE Attendee March 13, 2015
Viewed several lectures including keynote by David Kennedy
Examined the implications of social engineering attacks
Familiar with use of Social-Engineer Toolkit (SET)
Attended workshop that utilized Wireshark filters for forensic analysis
TEDx Embry Riddle Prescott, Prescott AZ April 4, 2015
Speaker
Delivered speech discussing the future of password security
Analyzed flaws in current electronic authentication systems and presented solutions
LEADERSHIP ISORT (Information Security Offensive Research Team), Embry Riddle 2015 - 2016
Training Officer
Responsible in leading group efforts towards National Cyber League competitions
Give weekly lectures to members on tools, security practices
Labs and activities are based on CompTIA Security+ and CEH certification requirements
ACTIVITIES Have account and practice offensive security techniques on the Arizona Cyber Warfare Range,
perform security and malware experiments in home lab