SlideShare a Scribd company logo
Benjamin D. Meck
Meckben2011@gmail.com
www.linkedin.com/in/benjaminmeck
(717) 919-8173
43 Tannery Road
Dillsburg, PA 17019
Education:
The PennsylvaniaState University University Park,PA
Graduated: May 2015 Cumulative GPA:3.22
Security and Risk Analysis
Option:Intelligence Analysis and Modeling Option
* Dean’sListforthespringsemesterof2012
Skills:
 Basic Knowledge of C++, Basic Understanding of Spanish, Game Theory, SPSS, Analyst Notebook, Economic
Fundamentals(MicroandMacro),MicrosoftSQLServer,ArcGIS
Projects:
 Legaland Regulatory EnvironmentofPrivacyandSecurity(IST452)
o Balancing National Security and Privacy: TheTerroristConundrum
 Team-based research discussing the combativenature of privacy against national security
 DeceptionandCounterDeception(SRA433)
o DiagnosesModel
 Createdamodeltotellif youarebeingdeceivedthroughaseriesof questions
 TheRoleof InformationandIntelligence(SRA321)
o DiscoveringaTerroristPlot:
 Team-basedprojectwhereweweregivenreportsandinformationandhad toderivethe plot.
Work Experience:
John Gross & Company November2006-Present
OrderEntry,and StoreSales Associate
 Received,entered, and delivered orders and entered into an order input software
program from $350-$15,000.
PennsylvaniaState University
Internfor the Center ofGlobal Studies August 2014- May 2015
 Announcing and describing upcoming international events
 Planning and assisting events throughout the schoolyear
LearningAssistantfor“TheRole of Informationand Intelligence”(SRA321) August 2014- Dec.2014
 Assisting with in class exercises
 Managed and resolved student questions
 Operating and managing the Penn State “Angel” system
LearningAssistantfor“TheThreatofTerrorismandCrime”(SRA211) August 2013- Dec 2013
August 2014- Dec 2014
LeadershipandInvolvement:
 Lead Intern for The Center forGlobal Studies (2015)
 YouthLeaderforUnitedMethodistActionReach-OutMissionby Youth(2012)

More Related Content

What's hot

The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
Trupti Shiralkar, CISSP
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
Astha Parihar
 
Cryptography in formtaion security
Cryptography in formtaion securityCryptography in formtaion security
Cryptography in formtaion security
sabihabatool1
 
Privacy-Preserving Reasoning on the Semantic Web (Poster)
Privacy-Preserving Reasoning on the Semantic Web (Poster)Privacy-Preserving Reasoning on the Semantic Web (Poster)
Privacy-Preserving Reasoning on the Semantic Web (Poster)
Jie Bao
 
scklinkedin-v1
scklinkedin-v1scklinkedin-v1
scklinkedin-v1
Sing Koo
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 

What's hot (6)

The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
Cryptography in formtaion security
Cryptography in formtaion securityCryptography in formtaion security
Cryptography in formtaion security
 
Privacy-Preserving Reasoning on the Semantic Web (Poster)
Privacy-Preserving Reasoning on the Semantic Web (Poster)Privacy-Preserving Reasoning on the Semantic Web (Poster)
Privacy-Preserving Reasoning on the Semantic Web (Poster)
 
scklinkedin-v1
scklinkedin-v1scklinkedin-v1
scklinkedin-v1
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 

Similar to MeckBenResume

Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
Liwei Ren任力偉
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
Deepak Kumar (D3)
 
Rey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin's Resume
Rey Ferdin's Resume
Rey Ferdin
 
Wisconsin , usa recount petition: ELECTIONS 2016 USA
Wisconsin , usa recount petition: ELECTIONS 2016 USAWisconsin , usa recount petition: ELECTIONS 2016 USA
Wisconsin , usa recount petition: ELECTIONS 2016 USA
ALINA MATSENKO AND AJAY MISHRA ALINA AND AJAY
 
Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
NickHarris84
 
Grey Logic
Grey LogicGrey Logic
Grey Logic
Mercyhurst College
 
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...
Nobukazu Yoshioka
 
Mash f41 a
Mash f41 aMash f41 a
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
Phdtopiccom
 
Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
NickHarris84
 
James pirrie resume 2.1
James pirrie resume 2.1James pirrie resume 2.1
James pirrie resume 2.1
James Pirrie
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
JenniferBraun16
 
CV
CVCV
Ian Powers Resume
Ian Powers ResumeIan Powers Resume
Ian Powers Resume
Ian Powers
 
Thin Slicing a Black Swan: When Less Is More
Thin Slicing a Black Swan: When Less Is MoreThin Slicing a Black Swan: When Less Is More
Thin Slicing a Black Swan: When Less Is More
Michele Chubirka
 
AI-Driven Logical Argumentation in Active Cyber Defense
AI-Driven Logical Argumentation in Active Cyber DefenseAI-Driven Logical Argumentation in Active Cyber Defense
AI-Driven Logical Argumentation in Active Cyber Defense
Shawn Riley
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Alistair Gillespie
 
Ht t17
Ht t17Ht t17

Similar to MeckBenResume (20)

Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Rey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin's Resume
Rey Ferdin's Resume
 
Wisconsin , usa recount petition: ELECTIONS 2016 USA
Wisconsin , usa recount petition: ELECTIONS 2016 USAWisconsin , usa recount petition: ELECTIONS 2016 USA
Wisconsin , usa recount petition: ELECTIONS 2016 USA
 
Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
 
Grey Logic
Grey LogicGrey Logic
Grey Logic
 
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...
 
Mash f41 a
Mash f41 aMash f41 a
Mash f41 a
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
 
James pirrie resume 2.1
James pirrie resume 2.1James pirrie resume 2.1
James pirrie resume 2.1
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
 
CV
CVCV
CV
 
Ian Powers Resume
Ian Powers ResumeIan Powers Resume
Ian Powers Resume
 
Thin Slicing a Black Swan: When Less Is More
Thin Slicing a Black Swan: When Less Is MoreThin Slicing a Black Swan: When Less Is More
Thin Slicing a Black Swan: When Less Is More
 
AI-Driven Logical Argumentation in Active Cyber Defense
AI-Driven Logical Argumentation in Active Cyber DefenseAI-Driven Logical Argumentation in Active Cyber Defense
AI-Driven Logical Argumentation in Active Cyber Defense
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
 
Ht t17
Ht t17Ht t17
Ht t17
 

MeckBenResume

  • 1. Benjamin D. Meck Meckben2011@gmail.com www.linkedin.com/in/benjaminmeck (717) 919-8173 43 Tannery Road Dillsburg, PA 17019 Education: The PennsylvaniaState University University Park,PA Graduated: May 2015 Cumulative GPA:3.22 Security and Risk Analysis Option:Intelligence Analysis and Modeling Option * Dean’sListforthespringsemesterof2012 Skills:  Basic Knowledge of C++, Basic Understanding of Spanish, Game Theory, SPSS, Analyst Notebook, Economic Fundamentals(MicroandMacro),MicrosoftSQLServer,ArcGIS Projects:  Legaland Regulatory EnvironmentofPrivacyandSecurity(IST452) o Balancing National Security and Privacy: TheTerroristConundrum  Team-based research discussing the combativenature of privacy against national security  DeceptionandCounterDeception(SRA433) o DiagnosesModel  Createdamodeltotellif youarebeingdeceivedthroughaseriesof questions  TheRoleof InformationandIntelligence(SRA321) o DiscoveringaTerroristPlot:  Team-basedprojectwhereweweregivenreportsandinformationandhad toderivethe plot. Work Experience: John Gross & Company November2006-Present OrderEntry,and StoreSales Associate  Received,entered, and delivered orders and entered into an order input software program from $350-$15,000. PennsylvaniaState University Internfor the Center ofGlobal Studies August 2014- May 2015  Announcing and describing upcoming international events  Planning and assisting events throughout the schoolyear LearningAssistantfor“TheRole of Informationand Intelligence”(SRA321) August 2014- Dec.2014  Assisting with in class exercises  Managed and resolved student questions  Operating and managing the Penn State “Angel” system LearningAssistantfor“TheThreatofTerrorismandCrime”(SRA211) August 2013- Dec 2013 August 2014- Dec 2014 LeadershipandInvolvement:  Lead Intern for The Center forGlobal Studies (2015)  YouthLeaderforUnitedMethodistActionReach-OutMissionby Youth(2012)