SlideShare a Scribd company logo
1 of 3
JON D. ASDOURIAN
695 Talamini Road, Bridgewater, NJ 08807
http://www.linkedin.com/pub/jon-asdourian
732-261-1846 jon.asdourian@gmail.com
SENIOR LEVEL CERTIFIED FORENSICS EXAMINER / INVESTIGATOR
Extensive experience preventing, mitigation, investigating and resolving fraud, misuse use of corporate
assets, theft of intellectual property, eDiscovey, intrusions and malware infections. Well-developed skills
conducting complex investigations; interviewing suspects, witnesses, and victims; testify in court during
civil and criminal litigation. Extensive training in Digital Forensics/Cell Phone Forensics evidence
preservation and evaluation. Dedicated leader with excellent communications skills and a proven track
record of success building relationships with legal and law enforcement organizations and preparing
evidence for criminal or civil ligation.
CERTIFICATIONS
DFCP - Digital Forensics Certifications Practitioner, Digital Forensics Certification Board
CHS III - Certified in Homeland Security Level III
CERT® -Certified Computer Security Incident Handler, SEI
ACE - AccessData Certified Examiner
SCERS – Small Computer Equipment Recovery Specialist – FLETC
GREM – Reverse Engineering Malware - GIAC
PROFESSIONAL EXPERIENCE
VERIZON WIRELESS, Basking Ridge, NJ 2006 – 2014
Senior Forensics Investigator
Senior Forensic Investigator responsible for all network investigations involving intrusions, misuse, theft
of intellectual property involving associates and customers.
• Investigated misuse of Text messaging or picture messaging and provided support and evidence
involving call detail records to support allegations of misuse or harassment.
• Performed network forensics as well as desktop forensics to support investigations.
• Senior Investigator for forensics investigation of computers and cell phone.
• Primary investigator for Intrusion Response team, eDiscovery, spam control, abuse email, reviewing
of firewall and proxy logs to support investigations.
• Primary forensic investigator for memory/malware analysis during an incident using HBgary and Sift
Workstation.
TD WATERHOUSE, Jersey City, NJ 2004 – 2006
Senior Forensics Investigator
Chief Forensics Investigator for intrusion response, incidents involving misuse, theft of intellectual
property of systems used within TD Waterhouse and for investigations involving identity theft, theft of
customer credentials, fraud and theft of assets.
• Senior Forensic Examiner responsible for recovery, evidence processing and reporting in any cases
involving computer equipment.
• Developed processes and procedures for Incidents and established contact with Law enforcement and
Bank officials to coordinate investigations.
• Provided reports to management and SEC on issues affecting compliance with banking regulations.
• Directed and coordinated intrusion response for security team
JON D. ASDOURIAN
Page Two
http://www.linkedin.com/pub/jon-asdourian
732-261-1846 jon.asdourian@gmail.com
PRIOR RELEVANT EXPERIENCE
ERNST & YOUNG LLP, Iselin, NJ
Senior Forensics Investigator
Manager - Computer Forensics and Incident Response Services, covering MetroNY.
Senior Investigator Managing investigations involving fraud in Pharmaceutical, Energy Trading and $7
Million eDiscovery investigations.
DEPARTMENT OF STATE, Diplomatic Security Service 1997 – 1999
Security Engineering Officer
Lead Engineer – Computer / Physical Security
Responsible for Physical and Technical Security Countermeasures in American Embassies and
Consulates. Provided technical and physical security for the Secretary of State while traveling overseas.
EDUCATION
Masters Science Information Systems, Stevens Institute of Technology, NJ
BAS, Electronic Engineering/Criminal Justice, (Cum Laude), Troy State University, Alabama
PROFESSIONAL DEVELOPMENT
• Sans Network FOR 508 Advanced Intrusion Response and Computer Forensics – Sept 2014
• Black Hat Mandiant Advanced Reverse Engineering 2013
• Black Hat Mandiant Reverse Engineering 2012
• FTK User Conference, Las Vegas 2011
• Reverse Engineering Malware, Sans Conference San Diego, May 10-13 2010
• ACE Certified, Access Data, 21 hours, Techno Security Conference Myrtle Beach, June 2009
• HBGary , 3 day training, Virginia March 2009, Annapolis Junction, MD
• Encase Enscript Programming - Phase II, Dec 9-12, 2008, Pasadena, Ca
• AccessData Boot Camp, May 28-30 2009, Techno Security, Myrtle Beach, SC
• Encase eDiscovery , February 23-27 2009, Basking Ridge, NJ
• Mandiant Incident Response and Malware Analysis August 4-8, 2008, BlackHat Conference, Las
Vegas
• Encase Enterprise Phase II 30 June – 3 July 2008, Pasadena, Ca.
• Encase Network Intrusion Investigations, 24-27 June 2008, Dulles, Va.
• Encase EnScript Programming – Phase I, Apr 15 to 18 2008, Dulles VA
• NT File System and Artifacts, Mar 25-29, 2008, Guidance Software, Dulles, Va
• Encase eDiscovery, 32 Hrs, 5-8 February 2008, Dulles, Va.
• Neutrino Mobile Phone Forensics, 16 hrs, 15-16 January 2008, Dulles, Va.
• Encase Advanced Computer Forensics, 32 hrs,11-14 December 2007, Sterling Va., Guidance
Software
• Encase Advanced Internet Examinations, 32 hrs,12-16 November 2007, Pasadena, Ca, Guidance
Software
• Encase Computer Forensics II Version 6, 32 hrs, Oct 2007, Sterling Va., Guidance Software
• Advanced Incident Handling for Technical Staff, Sept 24-28, 2007, CERT Training and Education,
Carnegie Mellon
• Fundamental of Incident Response, Aug 13-17, 2007, CERT Training and Education, Carnegie
Mellon
• Information Security for Technical Staff, Apr 23-27, 2007, CERT Training and Education,
Carnegie Mellon
JON D. ASDOURIAN
Page Three
http://www.linkedin.com/pub/jon-asdourian
732-261-1846 jon.asdourian@gmail.com
Professional Development, (Continued)
• Smart Linux Forensics 5 Days, March 2005
• Prodiscover Incident Response and Forensics, 8 hours, August 2004
• Introduction and Advanced Site Protector Training ISS, 5 days, ISS Atlanta Ga., January 2005
• Encase Enterprise, Response, Auditing and Discovery, Guidance Software,40 hours, Sterling, Va.
May 2003
• Ernst & Young Advance Forensics Training, Vienna Va., Feb 2000
• Forensics Computer Science Course, New Technologies, Inc, Gresham, Oregon, February 1999
• Data Hiding & Stegnography, New Technologies, Inc., Gresham, Oregon, February1999
• Ernst & Young Forensics Boot Camp, Vienna Va., October 1999
• Ernst & Young eXtreme hacking, New York, December 1999
• Forensics Computer Training, New Technologies, Inc., Gresham, Oregon, September 1999
• Small Computer Equipment Recovery Specialist, Federal Law Enforcement Academy, Ga, April
1999
• System Security Scanner Training, Internet Security Systems, Atlanta, Ga, January 1999
• RealSecure, Internet Security Systems, Atlanta, Ga, 36 hours, January 1999
• Internet Scanner, Internet Security Systems, Atlanta, Ga, 36 hours January 1999
• YW 225 Windows NT 4.0 Local Area Network Administrator, National Foreign Affairs Training
Center, 80 hours, May 1998.
• YW-177 Classified Local Area Networks National Foreign Affairs Training Center, August –
September 1998
• YW-640 Banyan LAN- Local Area Networks , Foreign Affairs Training Center, 40 Hours August,
1998
• Intrusion Detection and Hacking, Sytex, 36 hours, December 1998
Electronic Discovery Tools
• SQL Queries, Certified Microsoft Training, November 2002
• TSM & StorServer Training, Colorado Springs, January 2002
Technical Assessment Training
• Critical Infrastructure Vulnerability Assessments Training Course, National Security Agency/
Defense Treat Reduction Agency, Alexandria, VA. 40 Hours, March 1999
• NSA INFOSEC Vulnerability, Alexandria, VA, 40 Hours, March 1999
• Technical Security Training, Dept of State, 120 Hours, September – November 1991
• Safe and Lock Maintenance Course, Diplomatic Security Service, 80 hours, December 1992
• Safehaven Emergency Medical Training, Diplomatic Security Service, 36 hours, November 1992
• MTCR Course, Lindgren R.F Enclosures, Inc., 40 Hours, November 1992
Telephone Security Training
• Advanced Telephone (Lucent AT&T Attacks) 50b-08 Interagency Training Center 40 Hours,
January 1999
• Advanced Telephone (Lucent AT&T) 50a-08 Interagency Training Center, 40 hours, January 1999
• Meridian 1 Options 11-81c Familiarization, Nortel, Richardson, Texas April 1998
• Meridian x11 Basic Database Administration, Nortel, Richardson, Texas, April 1998
• YW-221 Mitel PBX SX-2000 , Foreign Affairs Training Center, 36 hours December 1997
• YW-219 Mitel SX 50, Foreign Affairs Training Center, December 1997
• YW-140 Introduction to Telephone & Key Systems , Foreign Affairs Training Center, November
1997
• YW-220 Mitel PBX SX – 200 Digital Switch, Foreign Affairs Training Center, December 1997

More Related Content

What's hot

Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Mobile device forensics
Mobile device forensicsMobile device forensics
Mobile device forensicsSuresh Kumar
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsFORnSECSolutions
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 

What's hot (20)

Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Mobile device forensics
Mobile device forensicsMobile device forensics
Mobile device forensics
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 

Similar to Asdourian, Jon

Boyd Bryant Resume July2012
Boyd Bryant  Resume July2012Boyd Bryant  Resume July2012
Boyd Bryant Resume July2012BoydBryant
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey Smith
 
Friedman Brett IT Resume 2018
Friedman Brett IT Resume 2018Friedman Brett IT Resume 2018
Friedman Brett IT Resume 2018Brett Friedman
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Shawn Tuma
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency SolutionsAnthony Dials
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To PrepareResilient Systems
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt ResumeDonna Robeck
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14UpdatedNetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14UpdatedKevin Moore MSIT, MISM
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Crew
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business SolutionsAnthony Dials
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 

Similar to Asdourian, Jon (20)

Boyd Bryant Resume July2012
Boyd Bryant  Resume July2012Boyd Bryant  Resume July2012
Boyd Bryant Resume July2012
 
resume_dallasSwathwood
resume_dallasSwathwoodresume_dallasSwathwood
resume_dallasSwathwood
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016
 
Friedman Brett IT Resume 2018
Friedman Brett IT Resume 2018Friedman Brett IT Resume 2018
Friedman Brett IT Resume 2018
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 
JP RESUME
JP RESUMEJP RESUME
JP RESUME
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14UpdatedNetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
MikeDuley-Legal-CV
MikeDuley-Legal-CVMikeDuley-Legal-CV
MikeDuley-Legal-CV
 

Asdourian, Jon

  • 1. JON D. ASDOURIAN 695 Talamini Road, Bridgewater, NJ 08807 http://www.linkedin.com/pub/jon-asdourian 732-261-1846 jon.asdourian@gmail.com SENIOR LEVEL CERTIFIED FORENSICS EXAMINER / INVESTIGATOR Extensive experience preventing, mitigation, investigating and resolving fraud, misuse use of corporate assets, theft of intellectual property, eDiscovey, intrusions and malware infections. Well-developed skills conducting complex investigations; interviewing suspects, witnesses, and victims; testify in court during civil and criminal litigation. Extensive training in Digital Forensics/Cell Phone Forensics evidence preservation and evaluation. Dedicated leader with excellent communications skills and a proven track record of success building relationships with legal and law enforcement organizations and preparing evidence for criminal or civil ligation. CERTIFICATIONS DFCP - Digital Forensics Certifications Practitioner, Digital Forensics Certification Board CHS III - Certified in Homeland Security Level III CERT® -Certified Computer Security Incident Handler, SEI ACE - AccessData Certified Examiner SCERS – Small Computer Equipment Recovery Specialist – FLETC GREM – Reverse Engineering Malware - GIAC PROFESSIONAL EXPERIENCE VERIZON WIRELESS, Basking Ridge, NJ 2006 – 2014 Senior Forensics Investigator Senior Forensic Investigator responsible for all network investigations involving intrusions, misuse, theft of intellectual property involving associates and customers. • Investigated misuse of Text messaging or picture messaging and provided support and evidence involving call detail records to support allegations of misuse or harassment. • Performed network forensics as well as desktop forensics to support investigations. • Senior Investigator for forensics investigation of computers and cell phone. • Primary investigator for Intrusion Response team, eDiscovery, spam control, abuse email, reviewing of firewall and proxy logs to support investigations. • Primary forensic investigator for memory/malware analysis during an incident using HBgary and Sift Workstation. TD WATERHOUSE, Jersey City, NJ 2004 – 2006 Senior Forensics Investigator Chief Forensics Investigator for intrusion response, incidents involving misuse, theft of intellectual property of systems used within TD Waterhouse and for investigations involving identity theft, theft of customer credentials, fraud and theft of assets. • Senior Forensic Examiner responsible for recovery, evidence processing and reporting in any cases involving computer equipment. • Developed processes and procedures for Incidents and established contact with Law enforcement and Bank officials to coordinate investigations. • Provided reports to management and SEC on issues affecting compliance with banking regulations. • Directed and coordinated intrusion response for security team
  • 2. JON D. ASDOURIAN Page Two http://www.linkedin.com/pub/jon-asdourian 732-261-1846 jon.asdourian@gmail.com PRIOR RELEVANT EXPERIENCE ERNST & YOUNG LLP, Iselin, NJ Senior Forensics Investigator Manager - Computer Forensics and Incident Response Services, covering MetroNY. Senior Investigator Managing investigations involving fraud in Pharmaceutical, Energy Trading and $7 Million eDiscovery investigations. DEPARTMENT OF STATE, Diplomatic Security Service 1997 – 1999 Security Engineering Officer Lead Engineer – Computer / Physical Security Responsible for Physical and Technical Security Countermeasures in American Embassies and Consulates. Provided technical and physical security for the Secretary of State while traveling overseas. EDUCATION Masters Science Information Systems, Stevens Institute of Technology, NJ BAS, Electronic Engineering/Criminal Justice, (Cum Laude), Troy State University, Alabama PROFESSIONAL DEVELOPMENT • Sans Network FOR 508 Advanced Intrusion Response and Computer Forensics – Sept 2014 • Black Hat Mandiant Advanced Reverse Engineering 2013 • Black Hat Mandiant Reverse Engineering 2012 • FTK User Conference, Las Vegas 2011 • Reverse Engineering Malware, Sans Conference San Diego, May 10-13 2010 • ACE Certified, Access Data, 21 hours, Techno Security Conference Myrtle Beach, June 2009 • HBGary , 3 day training, Virginia March 2009, Annapolis Junction, MD • Encase Enscript Programming - Phase II, Dec 9-12, 2008, Pasadena, Ca • AccessData Boot Camp, May 28-30 2009, Techno Security, Myrtle Beach, SC • Encase eDiscovery , February 23-27 2009, Basking Ridge, NJ • Mandiant Incident Response and Malware Analysis August 4-8, 2008, BlackHat Conference, Las Vegas • Encase Enterprise Phase II 30 June – 3 July 2008, Pasadena, Ca. • Encase Network Intrusion Investigations, 24-27 June 2008, Dulles, Va. • Encase EnScript Programming – Phase I, Apr 15 to 18 2008, Dulles VA • NT File System and Artifacts, Mar 25-29, 2008, Guidance Software, Dulles, Va • Encase eDiscovery, 32 Hrs, 5-8 February 2008, Dulles, Va. • Neutrino Mobile Phone Forensics, 16 hrs, 15-16 January 2008, Dulles, Va. • Encase Advanced Computer Forensics, 32 hrs,11-14 December 2007, Sterling Va., Guidance Software • Encase Advanced Internet Examinations, 32 hrs,12-16 November 2007, Pasadena, Ca, Guidance Software • Encase Computer Forensics II Version 6, 32 hrs, Oct 2007, Sterling Va., Guidance Software • Advanced Incident Handling for Technical Staff, Sept 24-28, 2007, CERT Training and Education, Carnegie Mellon • Fundamental of Incident Response, Aug 13-17, 2007, CERT Training and Education, Carnegie Mellon • Information Security for Technical Staff, Apr 23-27, 2007, CERT Training and Education, Carnegie Mellon
  • 3. JON D. ASDOURIAN Page Three http://www.linkedin.com/pub/jon-asdourian 732-261-1846 jon.asdourian@gmail.com Professional Development, (Continued) • Smart Linux Forensics 5 Days, March 2005 • Prodiscover Incident Response and Forensics, 8 hours, August 2004 • Introduction and Advanced Site Protector Training ISS, 5 days, ISS Atlanta Ga., January 2005 • Encase Enterprise, Response, Auditing and Discovery, Guidance Software,40 hours, Sterling, Va. May 2003 • Ernst & Young Advance Forensics Training, Vienna Va., Feb 2000 • Forensics Computer Science Course, New Technologies, Inc, Gresham, Oregon, February 1999 • Data Hiding & Stegnography, New Technologies, Inc., Gresham, Oregon, February1999 • Ernst & Young Forensics Boot Camp, Vienna Va., October 1999 • Ernst & Young eXtreme hacking, New York, December 1999 • Forensics Computer Training, New Technologies, Inc., Gresham, Oregon, September 1999 • Small Computer Equipment Recovery Specialist, Federal Law Enforcement Academy, Ga, April 1999 • System Security Scanner Training, Internet Security Systems, Atlanta, Ga, January 1999 • RealSecure, Internet Security Systems, Atlanta, Ga, 36 hours, January 1999 • Internet Scanner, Internet Security Systems, Atlanta, Ga, 36 hours January 1999 • YW 225 Windows NT 4.0 Local Area Network Administrator, National Foreign Affairs Training Center, 80 hours, May 1998. • YW-177 Classified Local Area Networks National Foreign Affairs Training Center, August – September 1998 • YW-640 Banyan LAN- Local Area Networks , Foreign Affairs Training Center, 40 Hours August, 1998 • Intrusion Detection and Hacking, Sytex, 36 hours, December 1998 Electronic Discovery Tools • SQL Queries, Certified Microsoft Training, November 2002 • TSM & StorServer Training, Colorado Springs, January 2002 Technical Assessment Training • Critical Infrastructure Vulnerability Assessments Training Course, National Security Agency/ Defense Treat Reduction Agency, Alexandria, VA. 40 Hours, March 1999 • NSA INFOSEC Vulnerability, Alexandria, VA, 40 Hours, March 1999 • Technical Security Training, Dept of State, 120 Hours, September – November 1991 • Safe and Lock Maintenance Course, Diplomatic Security Service, 80 hours, December 1992 • Safehaven Emergency Medical Training, Diplomatic Security Service, 36 hours, November 1992 • MTCR Course, Lindgren R.F Enclosures, Inc., 40 Hours, November 1992 Telephone Security Training • Advanced Telephone (Lucent AT&T Attacks) 50b-08 Interagency Training Center 40 Hours, January 1999 • Advanced Telephone (Lucent AT&T) 50a-08 Interagency Training Center, 40 hours, January 1999 • Meridian 1 Options 11-81c Familiarization, Nortel, Richardson, Texas April 1998 • Meridian x11 Basic Database Administration, Nortel, Richardson, Texas, April 1998 • YW-221 Mitel PBX SX-2000 , Foreign Affairs Training Center, 36 hours December 1997 • YW-219 Mitel SX 50, Foreign Affairs Training Center, December 1997 • YW-140 Introduction to Telephone & Key Systems , Foreign Affairs Training Center, November 1997 • YW-220 Mitel PBX SX – 200 Digital Switch, Foreign Affairs Training Center, December 1997