Personal Information
Organization / Workplace
Greater Atlanta Area, GA United States
Occupation
Director of Security Data Engineering at Capital One
Website
www.covert.io
About
Specialties: Software Engineering, Network Security, Java Development, Linux Administration, Network Analysis, Network and Security Research, Cloud Computing, Hadoop/MapReduce, Certified Ethical Hacker, Cloudera Certified Hadoop Developer, Large scale data processing and analytics development using Accumulo, Hadoop, and Mapreduce
Tags
threat intelligence
security
threatstream
honeypot
supply chain
honeynet
network security
malware
anomali
ids
honeypots
hacking
sensors
credential exposure
vulnerability
hacked
bsidesnyc 2016
bsidesnyc
malware sandbox
flocon 2016
contextualization
sandboxes
adversary
mhn
flocon 2015
intrusion detection
open source
intrusion
network
data analysis
hadoop
apache hadoop
big data
dns
flocon
storm
machine learning
See more
Presentations
(13)Likes
(33)WeirdAAL (AWS Attack Library)
Chris Gates
•
5 years ago
SANSFIRE - Elections, Deceptions and Political Breaches
John Bambenek
•
6 years ago
The Industrial Revolution of Lateral Movement
Tal Be'ery
•
6 years ago
Machine Learning Model Bakeoff
mrphilroth
•
6 years ago
Scalable Spark deployment using Kubernetes
datamantra
•
7 years ago
Sandbox detection: leak, abuse, test - Hacktivity 2015
Zoltan Balazs
•
8 years ago
From SIEM to SA: The Path Forward
EMC
•
10 years ago
openioc_scan - IOC scanner for memory forensics
Takahiro Haruyama
•
8 years ago
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
Gianluca Stringhini
•
8 years ago
Examining Malware with Python
mrphilroth
•
8 years ago
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on the Cheap
Andrew Morris
•
9 years ago
The Impala Cookbook
Cloudera, Inc.
•
9 years ago
Security Operations, Engineering, and Intelligence Integration through the power of Graph(DB)!
Christopher Clark
•
9 years ago
Apache Kafka 0.8 basic training - Verisign
Michael Noll
•
9 years ago
Apache Storm 0.9 basic training - Verisign
Michael Noll
•
9 years ago
How to Interview a Data Scientist
Daniel Tunkelang
•
11 years ago
The Heatmap - Why is Security Visualization so Hard?
Raffael Marty
•
9 years ago
Hivemail: Scalable Machine Learning Library for Apache Hive
DataWorks Summit
•
9 years ago
Summingbird: Streaming Portable, MapReduce
DataWorks Summit
•
9 years ago
Recent Developments in Spark MLlib and Beyond
DataWorks Summit
•
9 years ago
Cisco OpenSOC
James Sirota
•
9 years ago
Infrastructure at Scale: Apache Kafka, Twitter Storm & Elastic Search (ARC303) | AWS re:Invent 2013
Amazon Web Services
•
10 years ago
Productionalizing Spark Streaming
Ryan Weald
•
10 years ago
ruxc0n 2012
mimeframe
•
11 years ago
ruxc0n 2012
mimeframe
•
11 years ago
Attack-driven defense
Zane Lackey
•
10 years ago
Apache Accumulo and Cloudera
Joey Echeverria
•
10 years ago
An Underground education
grugq
•
10 years ago
Hortonworks: Agile Analytics Applications
russell_jurney
•
11 years ago
Culture
Reed Hastings
•
14 years ago
Personal Information
Organization / Workplace
Greater Atlanta Area, GA United States
Occupation
Director of Security Data Engineering at Capital One
Website
www.covert.io
About
Specialties: Software Engineering, Network Security, Java Development, Linux Administration, Network Analysis, Network and Security Research, Cloud Computing, Hadoop/MapReduce, Certified Ethical Hacker, Cloudera Certified Hadoop Developer, Large scale data processing and analytics development using Accumulo, Hadoop, and Mapreduce
Tags
threat intelligence
security
threatstream
honeypot
supply chain
honeynet
network security
malware
anomali
ids
honeypots
hacking
sensors
credential exposure
vulnerability
hacked
bsidesnyc 2016
bsidesnyc
malware sandbox
flocon 2016
contextualization
sandboxes
adversary
mhn
flocon 2015
intrusion detection
open source
intrusion
network
data analysis
hadoop
apache hadoop
big data
dns
flocon
storm
machine learning
See more