SlideShare a Scribd company logo
1 of 2
Download to read offline
Justin Kelso
Purcellville, VA 20132
Justin.Kelso.Resume@gmail.com
571/*/888/*/9147
(ISC)² Certified Information Systems Security Professional (CISSP)
Professional Background: 15 years of Experience
Product Management – HPE ArcSight
Drive improvement and innovation in the ArcSight product portfolio through interaction with customers, field
organizations, and internal stakeholders. Translate complex requirements into features and solutions for ArcSight
products. Specializations in security operations, investigations, case management, and workflow optimizations.
Senior Pre-Sales Engineer / Solutions Architect:
Responsible for the creation of technical solution components of strategic sales including the design, presentation,
and demonstration of security and risk management solutions engineered to meet individual customer requirements.
SOC Analytics Development:
Translated customer requirements into analytical processes, techniques, and tools utilized by SOC analysts at all
levels to gather, interpret, and report security incident information.
Security Operations Center Supervision:
Oversaw and directed daily operations of the SOC, acted as focal point for customer interactions, and ensured the
timeliness and accuracy of all deliverables.
Work Experience:
Regional Product Management Director – HPE ArcSight, AMS
HPE Enterprise Security Products - ArcSight
Aug 2015 - Present
Purcellville, VA
 Provide subject matter expertise in cyber security and security operations to ArcSight Product Management and
Development organizations to improve feature / function and foster meaningful innovation in products and solutions
 Research and analysis of competitive products and market trends in security and analytics spaces to develop
requirements for product improvements, new offerings, product strategy, and go-to-market
 Gather and translate complex customer pain into requirements for product improvements and new offerings
 Synchronize cross-product initiatives between individual product lines and de-conflict prioritization of key features
 Align efforts between field organizations, professional services, and support to accelerate resolution of customer
technology escalations. Identify opportunities for product and process improvements to better serve customers
 Develop and deliver product and technology enablement to increase the expertise of field organizations and partners
 Interface with Product Marketing to develop and refine product messaging and assist with strategic initiatives
 Private and public speaking and presentations to evangelize products offerings and facilitate customer interaction
and technology adoption.
Senior Pre-Sales Engineer / Solutions Architect
HP Enterprise Security Products
Oct 2011- Aug 2015
Herndon, VA
 Responsible for the creation of technical solution components of strategic sales including the design, presentation,
and demonstration of security and risk management solutions engineered to meet individual customer requirements
 Fostered and managed numerous complex customer relationships across US Federal market. Leveraged subject
matter expertise to become trusted advisor to existing and prospective customers
 Developed and delivered technical product and solutions training to customers, partners, and internal organizations
 Evangelized HP solutions across technical portfolios through work with HP and partner marketing organizations via
trade shows and technical workshops
 Displayed thought leadership and initiative in the development of unique technical materials on advanced strategic
designs and revitalized competitive intelligence programs through training, research, development, and presentation
of competitive materials to the world-wide sales / pre-sales staff
ArcSight Technical Instructor
Knowledge Consulting Group
Feb 2010 – Oct 2011
Reston, VA
 Provide classroom and training on the ArcSight family of products including ESM, Logger, and Connector software
 Lead network engineer / architect; evaluate initial equipment utilization and topology design; identify weaknesses
and limitations; redesign and implement topology and equipment configuration changes to better promote efficiency
and security across all corporate networks
 Serve as network security subject matter expert. Collaborate with management to develop and execute security
policy and secure operations guidelines; design enterprise security architecture plan for monitoring, IR, and SIEM
SOC Watch Officer / ArcSight Content Manager
Nortel Government Solutions
Nov 2007 - Feb 2010
United States Senate SOC: Manassas, VA
 Lead daily operations and personnel within 24x7 Security Operations Center (SOC). Provided expertise and
guidance to the identification and resolution of all cyber security threats and attacks, foreign or domestic, against
systems and networks owned or operated by the United States Senate nationwide
 Lead investigation of all security events / incidents. Provided top tier analysis during investigations to identify the
vector of attack, and scope of impact; created on the fly recommendations for response, remediation, and prevention
 ArcSight Content Developer: created ArcSight content to intelligently interpret over 100 million alerts a day
identifying suspicious activity fitting various attack vectors. Content is capable of identifying most compromises
resultant from zero-day exploitation or targeted attacks from malicious actors. Designed to place valuable data at the
fingertips of security analysts. Information formatted to be easy to interpret and analyze by all levels expertise
 SOC Subject Matter Expert (SME). Applied expert level analytical and problem solving skills to incident
investigation and response. Provided guidance and recommendations to customer. Fostered working relationships
with other members of the Government Forum of Incident Response and Security Teams (GFIRST) community
Information Security Engineer Senior Professional
CSC – Eagle Alliance
July 2007 - Oct 2007
National Security Agency: Ft Meade, MD
 Actively monitored various Intrusion Detection Systems (IDS) for indicators of possible cyber-attacks,
misconfigurations, and malicious logic attempts to enter or traverse Agency networks
 Provided real-time network traffic analysis services; actively searched for anomalous activity, virus and worm
communications, and possible attempts to exploit Agency assets or networks
 Monitored enterprise-wide virus reporting system, processed virus alerts to prevent the spread of malicious logic
within Agency’s enterprise networks
 Utilized open source media to identify cyber security threats such as newly released viruses, worms, and 0-day
exploits; compiled identifying information on new threats and analyzed network traffic for indications of occurrence
Network Security Team Lead
USAF
Sept 2006 - July 2007
National Security Agency: Ft Meade, MD
 Lead National Security Agency’s network defense for all agency information systems and networks worldwide
 Detect cyber attacks against NSA/CSS information assets and direct protective actions in real-time
 Focal point for all emergency situations involving NSA information assets
 Coordinate real-time analysis of network security events to ensure network integrity and availability
 Manage response to virus outbreaks on NSA networks, ensuring the mission is able to continue without degradation
 Proactively identify zero-day vulnerabilities in NSA networks and coordinate measures to prevent exploitation
 Provide real-time information to the Intelligence Community and Joint Task Force- Global Network Operations on
computer security issues and network status
Extended history 2001 - 2006 available upon request.

More Related Content

What's hot

Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations CenterSiemplify
 
(SACON) Wayne Tufek - chapter seven - putting it all together
(SACON) Wayne Tufek - chapter seven - putting it all together(SACON) Wayne Tufek - chapter seven - putting it all together
(SACON) Wayne Tufek - chapter seven - putting it all togetherPriyanka Aash
 
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1
Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1Todd Petty
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016Sarah Bark
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthKen Tulegenov
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resumeAlbert Gonzales
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA Cyber Security
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2Ron Miller
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 

What's hot (20)

Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
(SACON) Wayne Tufek - chapter seven - putting it all together
(SACON) Wayne Tufek - chapter seven - putting it all together(SACON) Wayne Tufek - chapter seven - putting it all together
(SACON) Wayne Tufek - chapter seven - putting it all together
 
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1
Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in Depth
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 

Similar to Resume justin kelso 2017

Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Tom Reinheimer
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security EngineerMark Long
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216William Linder
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneerMark Long
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
 
AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2Anna Vysotskaya
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame caSteve Alameda
 
Chris Atkins 3.24.16
Chris Atkins 3.24.16Chris Atkins 3.24.16
Chris Atkins 3.24.16Chris Atkins
 

Similar to Resume justin kelso 2017 (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneer
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2
 
Michael Bowers Resume
Michael Bowers ResumeMichael Bowers Resume
Michael Bowers Resume
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame ca
 
628577
628577628577
628577
 
Chris Atkins 3.24.16
Chris Atkins 3.24.16Chris Atkins 3.24.16
Chris Atkins 3.24.16
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Resume justin kelso 2017

  • 1. Justin Kelso Purcellville, VA 20132 Justin.Kelso.Resume@gmail.com 571/*/888/*/9147 (ISC)² Certified Information Systems Security Professional (CISSP) Professional Background: 15 years of Experience Product Management – HPE ArcSight Drive improvement and innovation in the ArcSight product portfolio through interaction with customers, field organizations, and internal stakeholders. Translate complex requirements into features and solutions for ArcSight products. Specializations in security operations, investigations, case management, and workflow optimizations. Senior Pre-Sales Engineer / Solutions Architect: Responsible for the creation of technical solution components of strategic sales including the design, presentation, and demonstration of security and risk management solutions engineered to meet individual customer requirements. SOC Analytics Development: Translated customer requirements into analytical processes, techniques, and tools utilized by SOC analysts at all levels to gather, interpret, and report security incident information. Security Operations Center Supervision: Oversaw and directed daily operations of the SOC, acted as focal point for customer interactions, and ensured the timeliness and accuracy of all deliverables. Work Experience: Regional Product Management Director – HPE ArcSight, AMS HPE Enterprise Security Products - ArcSight Aug 2015 - Present Purcellville, VA  Provide subject matter expertise in cyber security and security operations to ArcSight Product Management and Development organizations to improve feature / function and foster meaningful innovation in products and solutions  Research and analysis of competitive products and market trends in security and analytics spaces to develop requirements for product improvements, new offerings, product strategy, and go-to-market  Gather and translate complex customer pain into requirements for product improvements and new offerings  Synchronize cross-product initiatives between individual product lines and de-conflict prioritization of key features  Align efforts between field organizations, professional services, and support to accelerate resolution of customer technology escalations. Identify opportunities for product and process improvements to better serve customers  Develop and deliver product and technology enablement to increase the expertise of field organizations and partners  Interface with Product Marketing to develop and refine product messaging and assist with strategic initiatives  Private and public speaking and presentations to evangelize products offerings and facilitate customer interaction and technology adoption. Senior Pre-Sales Engineer / Solutions Architect HP Enterprise Security Products Oct 2011- Aug 2015 Herndon, VA  Responsible for the creation of technical solution components of strategic sales including the design, presentation, and demonstration of security and risk management solutions engineered to meet individual customer requirements  Fostered and managed numerous complex customer relationships across US Federal market. Leveraged subject matter expertise to become trusted advisor to existing and prospective customers  Developed and delivered technical product and solutions training to customers, partners, and internal organizations  Evangelized HP solutions across technical portfolios through work with HP and partner marketing organizations via trade shows and technical workshops  Displayed thought leadership and initiative in the development of unique technical materials on advanced strategic designs and revitalized competitive intelligence programs through training, research, development, and presentation of competitive materials to the world-wide sales / pre-sales staff
  • 2. ArcSight Technical Instructor Knowledge Consulting Group Feb 2010 – Oct 2011 Reston, VA  Provide classroom and training on the ArcSight family of products including ESM, Logger, and Connector software  Lead network engineer / architect; evaluate initial equipment utilization and topology design; identify weaknesses and limitations; redesign and implement topology and equipment configuration changes to better promote efficiency and security across all corporate networks  Serve as network security subject matter expert. Collaborate with management to develop and execute security policy and secure operations guidelines; design enterprise security architecture plan for monitoring, IR, and SIEM SOC Watch Officer / ArcSight Content Manager Nortel Government Solutions Nov 2007 - Feb 2010 United States Senate SOC: Manassas, VA  Lead daily operations and personnel within 24x7 Security Operations Center (SOC). Provided expertise and guidance to the identification and resolution of all cyber security threats and attacks, foreign or domestic, against systems and networks owned or operated by the United States Senate nationwide  Lead investigation of all security events / incidents. Provided top tier analysis during investigations to identify the vector of attack, and scope of impact; created on the fly recommendations for response, remediation, and prevention  ArcSight Content Developer: created ArcSight content to intelligently interpret over 100 million alerts a day identifying suspicious activity fitting various attack vectors. Content is capable of identifying most compromises resultant from zero-day exploitation or targeted attacks from malicious actors. Designed to place valuable data at the fingertips of security analysts. Information formatted to be easy to interpret and analyze by all levels expertise  SOC Subject Matter Expert (SME). Applied expert level analytical and problem solving skills to incident investigation and response. Provided guidance and recommendations to customer. Fostered working relationships with other members of the Government Forum of Incident Response and Security Teams (GFIRST) community Information Security Engineer Senior Professional CSC – Eagle Alliance July 2007 - Oct 2007 National Security Agency: Ft Meade, MD  Actively monitored various Intrusion Detection Systems (IDS) for indicators of possible cyber-attacks, misconfigurations, and malicious logic attempts to enter or traverse Agency networks  Provided real-time network traffic analysis services; actively searched for anomalous activity, virus and worm communications, and possible attempts to exploit Agency assets or networks  Monitored enterprise-wide virus reporting system, processed virus alerts to prevent the spread of malicious logic within Agency’s enterprise networks  Utilized open source media to identify cyber security threats such as newly released viruses, worms, and 0-day exploits; compiled identifying information on new threats and analyzed network traffic for indications of occurrence Network Security Team Lead USAF Sept 2006 - July 2007 National Security Agency: Ft Meade, MD  Lead National Security Agency’s network defense for all agency information systems and networks worldwide  Detect cyber attacks against NSA/CSS information assets and direct protective actions in real-time  Focal point for all emergency situations involving NSA information assets  Coordinate real-time analysis of network security events to ensure network integrity and availability  Manage response to virus outbreaks on NSA networks, ensuring the mission is able to continue without degradation  Proactively identify zero-day vulnerabilities in NSA networks and coordinate measures to prevent exploitation  Provide real-time information to the Intelligence Community and Joint Task Force- Global Network Operations on computer security issues and network status Extended history 2001 - 2006 available upon request.