SlideShare a Scribd company logo
1 of 1
Ian Powers
3161 Willow Creek Road, Prescott, AZ 86301 Apt. 132 | 602- 427-7404 | ianspowers@gmail.com
OBJECTIVE To obtain a position in the field of information and cyber security
EDUCATION Embry-Riddle AeronauticalUniversity (ERAU), Prescott, AZ
Bachelor of Science in Cyber Security & Intelligence December 2016
CGPA: 3.833
Dean’s List: Fall 2013, Spring 2014, Fall 2014, Spring 2015, Fall 2015
Dobson High School
High School Diploma May 2013
Graduated top 20 in class
TECHNOLOGY Knowledgeable utilizing HTML, CSS, Javascript, ANSI Standard C Programing, C++, Python, Apache,
AccessData Forensic Toolkit, Nessus, Microsoft Windows, Outlook, Word, Excel, PowerPoint, Project,
Kali Linux and programs within the Kali Linux Suite: Armitage, Metasploit, Nmap, Aircrack-ng,
Wireshark, Maltego, Reaver, Hydra, John the Ripper, Snort, Sqlmap, Scapy, and Ettercap
RELEVANT Intro to Cyber Security Malware Analysis
COURSEWORK Intro to Computer Forensics Quantitative Methods I
(* = currently enrolled) Computer Science I, II Introductory Physics I, II
Principles of Management Intro to Computer Networks
Studies in Global Intelligence I Advanced Computer Based Systems
Certified Ethical Hacker Security Fundamentals
Operating Systems Intro to Discrete Structures
*Securing Computer Networks *Network Security (Cryptography)
*Intelligence and Technology *Cyber Capstone Project
RELEVANT CactusCon
EXPERIENCE Attendee March 13, 2015
 Viewed several lectures including keynote by David Kennedy
 Examined the implications of social engineering attacks
 Familiar with use of Social-Engineer Toolkit (SET)
 Attended workshop that utilized Wireshark filters for forensic analysis
TEDx Embry Riddle Prescott, Prescott AZ April 4, 2015
Speaker
 Delivered speech discussing the future of password security
 Analyzed flaws in current electronic authentication systems and presented solutions
LEADERSHIP ISORT (Information Security Offensive Research Team), Embry Riddle 2015 - 2016
Training Officer
 Responsible in leading group efforts towards National Cyber League competitions
 Give weekly lectures to members on tools, security practices
 Labs and activities are based on CompTIA Security+ and CEH certification requirements
ACTIVITIES Have account and practice offensive security techniques on the Arizona Cyber Warfare Range,
perform security and malware experiments in home lab

More Related Content

What's hot

Reduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security VulnerabilitiesReduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security VulnerabilitiesProtecode
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaEdureka!
 
Abhilash Owk - Resume
Abhilash Owk - ResumeAbhilash Owk - Resume
Abhilash Owk - Resumeabhilashowk
 
Cracking the mobile application code
Cracking the mobile application codeCracking the mobile application code
Cracking the mobile application codeSreenarayan A
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?festival ICT 2016
 
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...EndgameInc
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
Security and Emotion: Sentiment Analysis of Security Discussions on GitHub
Security and Emotion: Sentiment Analysis of Security Discussions on GitHubSecurity and Emotion: Sentiment Analysis of Security Discussions on GitHub
Security and Emotion: Sentiment Analysis of Security Discussions on GitHubAlexander Serebrenik
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingSoftware Guru
 
Container intrusions Do You Even IDS
Container intrusions Do You Even IDSContainer intrusions Do You Even IDS
Container intrusions Do You Even IDSAlfredo Hickman
 
Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Neelu Tripathy
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Simplilearn
 
DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7Andris Soroka
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingMissStevenson1
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingAgung Suwandaru
 

What's hot (20)

Reduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security VulnerabilitiesReduce the Risk of Open Source Security Vulnerabilities
Reduce the Risk of Open Source Security Vulnerabilities
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
Abhilash Owk - Resume
Abhilash Owk - ResumeAbhilash Owk - Resume
Abhilash Owk - Resume
 
Cracking the mobile application code
Cracking the mobile application codeCracking the mobile application code
Cracking the mobile application code
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
Ethical hacking course ppt
Ethical hacking course pptEthical hacking course ppt
Ethical hacking course ppt
 
Security and Emotion: Sentiment Analysis of Security Discussions on GitHub
Security and Emotion: Sentiment Analysis of Security Discussions on GitHubSecurity and Emotion: Sentiment Analysis of Security Discussions on GitHub
Security and Emotion: Sentiment Analysis of Security Discussions on GitHub
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
Container intrusions Do You Even IDS
Container intrusions Do You Even IDSContainer intrusions Do You Even IDS
Container intrusions Do You Even IDS
 
Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7DSS ITSEC 2012 Conference - Presentation CEHv7
DSS ITSEC 2012 Conference - Presentation CEHv7
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 

Viewers also liked

Ashford university psy 605 homework help 3
Ashford university psy 605 homework help 3Ashford university psy 605 homework help 3
Ashford university psy 605 homework help 3Elli Smith
 
Madasu Bhanu Teja
Madasu Bhanu TejaMadasu Bhanu Teja
Madasu Bhanu TejaBhanu Teja
 
Y6 words of indian origin
Y6 words of indian originY6 words of indian origin
Y6 words of indian origingavinnancarrow
 
PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...
PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...
PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...iMasters
 
KidKare_Pres_for_Training_Providers
KidKare_Pres_for_Training_ProvidersKidKare_Pres_for_Training_Providers
KidKare_Pres_for_Training_ProvidersAmber Cuellar
 
Fastest Growing Amazon.com Sellers April 2016 Report - Marketplace Pulse
Fastest Growing Amazon.com Sellers April 2016 Report - Marketplace PulseFastest Growing Amazon.com Sellers April 2016 Report - Marketplace Pulse
Fastest Growing Amazon.com Sellers April 2016 Report - Marketplace PulseColin Yu
 
Year four term two sight words
Year four term two sight wordsYear four term two sight words
Year four term two sight wordsgavinnancarrow
 
Ransburg Vector solo
Ransburg Vector soloRansburg Vector solo
Ransburg Vector soloyoprst
 
Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!Memoori
 
Phonics /ai/ , /ee/
Phonics /ai/ , /ee/Phonics /ai/ , /ee/
Phonics /ai/ , /ee/Grace Ng
 

Viewers also liked (14)

Ashford university psy 605 homework help 3
Ashford university psy 605 homework help 3Ashford university psy 605 homework help 3
Ashford university psy 605 homework help 3
 
Madasu Bhanu Teja
Madasu Bhanu TejaMadasu Bhanu Teja
Madasu Bhanu Teja
 
Y6 words of indian origin
Y6 words of indian originY6 words of indian origin
Y6 words of indian origin
 
PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...
PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...
PHP Experience 2016 - [Palestra] Vagrant, LXC, Docker, etc: Entenda as difere...
 
KidKare_Pres_for_Training_Providers
KidKare_Pres_for_Training_ProvidersKidKare_Pres_for_Training_Providers
KidKare_Pres_for_Training_Providers
 
Educación power point
Educación  power pointEducación  power point
Educación power point
 
Fastest Growing Amazon.com Sellers April 2016 Report - Marketplace Pulse
Fastest Growing Amazon.com Sellers April 2016 Report - Marketplace PulseFastest Growing Amazon.com Sellers April 2016 Report - Marketplace Pulse
Fastest Growing Amazon.com Sellers April 2016 Report - Marketplace Pulse
 
Volo volo
Volo voloVolo volo
Volo volo
 
Documento fusionado 3.compressed
Documento fusionado 3.compressedDocumento fusionado 3.compressed
Documento fusionado 3.compressed
 
Year four term two sight words
Year four term two sight wordsYear four term two sight words
Year four term two sight words
 
Ransburg Vector solo
Ransburg Vector soloRansburg Vector solo
Ransburg Vector solo
 
Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!
 
Phonics /ai/ , /ee/
Phonics /ai/ , /ee/Phonics /ai/ , /ee/
Phonics /ai/ , /ee/
 
Kaum iban
Kaum ibanKaum iban
Kaum iban
 

Similar to Ian Powers Resume

Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationChadni Islam
 
external oleksandr resume 10-17-16
external oleksandr resume 10-17-16 external oleksandr resume 10-17-16
external oleksandr resume 10-17-16 Oleksandr Fidrya
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineNYU Tandon Online
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resumeNavya Jain
 
Tirano_Graham_Resume
Tirano_Graham_ResumeTirano_Graham_Resume
Tirano_Graham_ResumeTirano Graham
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETTravarsaPrivateLimit
 
Pratibha Vishwakarma Resume
Pratibha Vishwakarma ResumePratibha Vishwakarma Resume
Pratibha Vishwakarma ResumePratibha Arun
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUNYU Tandon Online
 
Level up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdfLevel up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdfBrandon DeVault
 
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Chadni Islam
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 

Similar to Ian Powers Resume (20)

Resume_2016
Resume_2016Resume_2016
Resume_2016
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
external oleksandr resume 10-17-16
external oleksandr resume 10-17-16 external oleksandr resume 10-17-16
external oleksandr resume 10-17-16
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
Cv gulam rasool
Cv gulam rasoolCv gulam rasool
Cv gulam rasool
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resume
 
Tirano_Graham_Resume
Tirano_Graham_ResumeTirano_Graham_Resume
Tirano_Graham_Resume
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity Webinar
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
 
Resume_Intern
Resume_InternResume_Intern
Resume_Intern
 
Pratibha Vishwakarma Resume
Pratibha Vishwakarma ResumePratibha Vishwakarma Resume
Pratibha Vishwakarma Resume
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Level up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdfLevel up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdf
 
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
 

Ian Powers Resume

  • 1. Ian Powers 3161 Willow Creek Road, Prescott, AZ 86301 Apt. 132 | 602- 427-7404 | ianspowers@gmail.com OBJECTIVE To obtain a position in the field of information and cyber security EDUCATION Embry-Riddle AeronauticalUniversity (ERAU), Prescott, AZ Bachelor of Science in Cyber Security & Intelligence December 2016 CGPA: 3.833 Dean’s List: Fall 2013, Spring 2014, Fall 2014, Spring 2015, Fall 2015 Dobson High School High School Diploma May 2013 Graduated top 20 in class TECHNOLOGY Knowledgeable utilizing HTML, CSS, Javascript, ANSI Standard C Programing, C++, Python, Apache, AccessData Forensic Toolkit, Nessus, Microsoft Windows, Outlook, Word, Excel, PowerPoint, Project, Kali Linux and programs within the Kali Linux Suite: Armitage, Metasploit, Nmap, Aircrack-ng, Wireshark, Maltego, Reaver, Hydra, John the Ripper, Snort, Sqlmap, Scapy, and Ettercap RELEVANT Intro to Cyber Security Malware Analysis COURSEWORK Intro to Computer Forensics Quantitative Methods I (* = currently enrolled) Computer Science I, II Introductory Physics I, II Principles of Management Intro to Computer Networks Studies in Global Intelligence I Advanced Computer Based Systems Certified Ethical Hacker Security Fundamentals Operating Systems Intro to Discrete Structures *Securing Computer Networks *Network Security (Cryptography) *Intelligence and Technology *Cyber Capstone Project RELEVANT CactusCon EXPERIENCE Attendee March 13, 2015  Viewed several lectures including keynote by David Kennedy  Examined the implications of social engineering attacks  Familiar with use of Social-Engineer Toolkit (SET)  Attended workshop that utilized Wireshark filters for forensic analysis TEDx Embry Riddle Prescott, Prescott AZ April 4, 2015 Speaker  Delivered speech discussing the future of password security  Analyzed flaws in current electronic authentication systems and presented solutions LEADERSHIP ISORT (Information Security Offensive Research Team), Embry Riddle 2015 - 2016 Training Officer  Responsible in leading group efforts towards National Cyber League competitions  Give weekly lectures to members on tools, security practices  Labs and activities are based on CompTIA Security+ and CEH certification requirements ACTIVITIES Have account and practice offensive security techniques on the Arizona Cyber Warfare Range, perform security and malware experiments in home lab