Mickey Lasky (GCFA GWAPT GCFE RHCE CEH) 4079 Britwell Place, Fairfax, VA 22033 (703) 942-9156 | mickey@ita.org Principal Security Analyst | INFOSEC Engineer | Forensics Analyst Professional Experience Verisign, Reston, VA, January 2012 - Present Incident Response Manager Manage day-to-day incident response and investigative duties for Verisign. Coordinate multi-departmental responses to information security events including events within the corporate infrastructure, Verisign product offerings, and the .COM, .NET, .GOV, .TV, .CC, and .NAME resolution systems. Manage, operate, and analyze data from corporate security systems including Sourcefire IDS, Solera Network Forensics, Mandiant Intelligent Response, and EnCase. Analyze incident event data from FireEye and Damballa Failsafe appliances as well as other data sources. Maintain department database of investigations and security incidents. Act as Tier 3 support for the Global Service Desk with regards to desktop security incidents. Public Trust clearance with MBI for working with sensitive .GOV resolution data. Accomplishments: Designed and deployed multiple appliance (both physical and virtual) Solera Network Forensics capture infrastructure providing packet capture services for both corporate and server environments. Designed, published, and maintained corporate-wide Incident Response program guide including processes, procedures, contacts, review, and operational aspects. Upgraded and modernized existing forensics environment including upgrading to EnCase Enterprise 7 and the installation of AccessData Forensic Toolkit v4.1 for greater coverage. Produced new hire orientation training materials specializing in the information security aspects of the corporate environment. Network Solutions, Herndon, VA, August 2009 – December 2011 Manager, Systems & Platform Security Manage and lead day-to-day technical security operations for a global web hosting provider and domain name registrar and provide leadership for Corporate Security team. Operate and analyze results from enterprise detection systems such as Sourcefire, Tripwire, and several others. Perform incident response for compromises that occur within the network, both in production and on the back-end servers. Act as Tier 3 escalation point and on-call responder. Perform regular vulnerability assessments and internal penetration tests against corporate assets. Maintain corporate SSL certificates and ensure their freshness and renewal status. Provide security oversight and best-practices advice for ongoing operations within other organizations. Act as a security evangelist for the company and provide guidance on information security topics. Accomplishments: Designed and deployed multi-sensor Sourcefire Intrusion Prevention System covering public shared web hosting, corporate web storefront, three remote offices, and public E-Commerce environments directly leading to a reduction in attack volume to near zero percentage within the first 3 months of implementation. Researched and developed over 900 customized Snort signatures to assist in detection and prevention of attacks. Configured and deployed enterprise-wide 2-factor authentication system utilizing RSA SecurID in cluster failover mode. Designed and deployed enterprise-wide vulnerability management and remediation system utilizing Rapid7 NeXpose and multiple scanning engines for continuous scanning per environment and comprehensive remediation reporting. Designed and helped to deploy enterprise-wide network forensics solution utilizing Solera DeepSee allowing for previously unattainable visibility into traffic flow. Supported internal audits for ITGC/SOX and participated in 2 complete successful Level 1 PCI audits. Georgetown University, Washington, DC, May 2005 – August 2009 Senior Security Analyst Established the Information Security Office and program for the University leading day-to-day security operations. Perform security architecture reviews, vulnerability analyses, penetration tests, and risk assessments for University organizations and IT projects. Served as a tier 3 escalation contact for University help desk services. Led incident response and forensics analysis for security breaches and litigation support. Accomplishments: Project managed, designed, and led the implementation, of border HA VPN Nokia firewall cluster, for main campus data center, School of Foreign Service in Qatar and disaster recovery sites. Designed, implemented and managed campus-wide McAfee Data Loss Prevention Monitor (iGuard) system. Led the implementation and management of campus-wide McAfee Intrushield Intrusion Prevention System. Mickey Lasky (703)942-9156 Page 1 Designed, implemented and managed campus-wide Solera DS Series Network Forensics Appliance. Supported University network migration in reviewing and securing of over 500 servers to a default deny security stance. Performed forensics on a 2006 data breach that directly led to arrests and prosecution by Federal authorities. Managed the University Information Security Office student internship program. Guest lectured for computer science classes on the topic of Information Security. Computer Associates, Herndon, VA, May 2004 – May 2005 Security Specialist Deployed and operated the Managed Vulnerability Service (MVS) and Vulnerability Operations Center (VOC). Worked with clients to integrate the CA Unicenter suite into their existing environments to mitigate security threats. Created and distributed impact analysis reports to clients on existing and emerging security vulnerabilities. Accomplishments: Built the MVS Vulnerability Operations Center from scratch to support the newly launched MVS service. Configured, deployed, and managed Juniper Netscreen 204 and 5GT firewalls in a VPN configuration to support secure communications between the MVS VOC and client sites. Successfully deployed CA Unicenter to act as a patch management infrastructure for a large government agency supporting thousands of workstations simultaneously. Counterpane Internet Security, Chantilly, VA, January 2003 – May 2004 SOC Engineer Performed technical operations in a 24x7x365 Security Operations Center environment. Monitored third-party news sources to develop emerging security trends. Developed and distributed Intelligence Objects (security reports and updates) updating clients on imminent threats. Performed incident response for clients and Manage client security monitoring devices. Accomplishments: Part of the first team to detect the SQL Slammer outbreak before it became public and advised clients on how to remediate the threat. WorldCom (UUNET), Ashburn, VA, December 1993 – December 2002 Manager, Network Security Consulting, Business Services Responsible for managing the day to day operations of a staff of 6 in the Network Security Consulting division. Led and managed budget planning, forecasting and staff scheduling for client engagements Responsible for providing consultative services to customers on network and security matters Accomplishments: Implemented Hardware and software configuration for firewall and Intrusion Detection Systems for numerous clients. Technical Expertise OS Linux/Unix, Solaris, OSX & Microsoft Windows (All versions) Hardware - Access and Intrusion Managment (IDS/IPS): SourceFire (3D9900, 3D6500, DC3000), McAfee Network Security IPS/IDS Platform, PaloAlto (PA-2050), Tripwire (v7.x), RSA SecurID, LDAP Firewall & Networking: Nokia Firewalls (IP330, IP1260, IP1280, IP2450), Network Critical Network Taps, Cisco switches/routers, Cisco PIX 515/ASA 5520 Malware & Data Loss Prevention: Symantec SEP 11, McAfee Data Loss Prevention Monitor (formerly Reconnex iGuard Monitor), Solera DS3150, FireEye, Damballa Failsafe Forensics: ImageMaster Solo IV, Solera DeepSee, VOOM HardCopy II Software Tripwire, Check Point Firewall-1/VPN-1 NG/NGX, NMAP, Wireshark, Metasploit, Nokia IPSO 4.2/6.0/6.1, Tenable Nessus, Snort, tcpdump, Netflow, iptables, Paros, HP WebInspect, Rapid7 NeXpose, honeypots, AIDE Forensics AccessData Forensic Toolkit, X-Ways Forensics, Guidance EnCase 7.x, Autopsy Forensic Browser, The Sleuth Kit (TSK), Windows Forensic Toolkit, RegRipper, Volatility, SANS SIFT Workstation, Foremost, Scalpel, Sysinternals Suite, IEF, Mandiant Intelligent Response Mickey Lasky (703)942-9156 Page 2 Education/Certifications The American University, Bachelor of Arts in Broadcast Journalism 1994 Vice President, Private Investigators Association of Virginia 2011 SANS FOR610 – Reverse Engineering Malware SANS GIAC Certified Forensic Examiner (GCFE) #666 Pentesting with BackTrack Live, Offensive Security SANS GIAC Web Application Penetration Tester (GWAPT) #799 Red Hat Certified Engineer (RHCE) #805009840838122 SANS GIAC Certified Forensic Analyst (GCFA) #4598 EC Council Certified Ethical Hacker ECC915516 Registered Virginia Private Investigator DCJS #99143477 Check Point Certified Security Administrator, Security Engineer vNG and Instructor 2012 2012 2010 2010 2009 2008 2006 2003 Mickey Lasky (703)942-9156 Page 3