Greetings,

I'm looking for an employer in the San Francisco bay area or an employer 
willing to allow me to work remotely.  I will consider a variety of 
positions but would prefer a position in research and/or development.

A resume follows below.

Regards,

-Jeff


Jeffrey L. Nathan                                  [EMAIL PROTECTED]

Objective
---------

To research and develop new security technologies, improve
existing security technologies and bring an objective open mind
to a challenging and technical work environment developing
practical and tenable solutions.


Experience
----------

9/2001 - 5/2002
McKesson Corporation
San Francisco, CA
Enterprise Security Architect

* Developed and lead the deployment of a distributed enterprise
  Network Intrusion Detection architecture (including a low-
  cost, re-usable appliance platform).
* Designed centralized, enterprise logging architecture to
  aggregate system logs, facilitate minimal real time event
  detection and correlate events in post processing.
* Forensic analysis of possibly compromised production systems.
* Acted as a top-level internal security architect researching
  and developing new security technologies.

10/2000 - 9/2001
@stake, Inc.
San Francisco, CA
Senior Security Architect

* Performed penetration tests, vulnerability assessments,
  network assessments and application assessments.
* Designed Network and Host-based Intrusion Detection, secure
  logging and firewall/VPN architectures.
* Researched new network-based vulnerabilities and attacks
  against layer 2 network protocols.
* Firewall performance research.
* Forensic research and analysis of security vulnerabilities,
  exploit tools and compromised systems.
* Authored custom internal tools to facilitate research and
  penetration testing

1/2000 - 9/2000
Hiverworld, Inc.
Berkeley, CA
Senior Research Engineer

* Authored hardware and operating system specification for
  security appliances and implemented beta version of appliance
  platform.
* Aided in the design of a target based Network Intrusion
  Detection System.
* Forensic research and analysis of security vulnerabilities
  and exploit tools.  Researched and authored attack signatures
  and vulnerability signatures to Hiverworld's intrusion
  detection system and vulnerability scanner.
* Performed penetration tests of customer networks and systems.
* Ported numerous security exploits and tools from one Unix
  platform to another.

5/1998 - 12/1999
TEKsystems
Phoenix, AZ and Chicago, IL
System Administrator (contractor)

Motorola, Inc.

* Wrote custom installation tools and reporting tools to patch
  over 1500 Unix systems for Y2K.
* Authored automated tools to ensure consistency across all
  Unix platforms with regards to vendor patches, security
  policies (host-auditing) and general system health
  monitoring.

Encyclopedia Britannica, Online Network Operations

* Aided in planning and implementation of BPG.  Modified
  overall network design to improve integrity and security.
  Replaced legacy Novell network services with Solaris and
  Windows NT utilizing NIS and NT print services.
* Recommended system and network security policies.

8/1997 - 12/1999
Arizona State University, Systems & Network Management
Tempe, AZ
Computer Programming Specialist

* Partially developed a web-based DHCP management system.
* Developed and coordinated the implementation of web-based
  problem management and change control systems.

8/1996 - 8/1997
Open Port Technology, Inc.
Chicago, IL
System Administrator

* Performed all aspects of system, network and security
  administration and engineering.
* Implemented tools to monitor and verify system and network
  integrity and consistency.

7/1995 - 8/1996
Open Port Technology, Inc.
Chicago, IL
Quality Assurance Analyst

* Tested Unix, Windows and Macintosh client/server software.
* Designed test plans to ensure functionality of products and
  summarize their performance.


Technical Skills and Expertise
------------------------------

* Research: Forensic analysis of security vulnerabilities,
  exploit tools, network traffic and compromised systems post-
  mortem. Exploration of new insertion and evasion attacks and
  defenses for NIDS systems.  Analysis of security and
  networking products to discover vulnerabilities in
  network/application protocol implementations, IP stacks
  and state implementations.
* Networking: Intricate knowledge of TCP/IP and link layer
  protocols.  Cursory knowledge of routing protocols.
  Expertise in intrusion detection systems (NIDS), firewalls
  and vulnerability scanners.
* Programming: C, Perl, Unix shells, SQL, debugging and
  revision control.
  * Sockets, general Unix system programming, network
    protocol normalization and decoding
  * Network Intrusion Detection development (discrete
    protocol anomaly detection, stream reassembly, IP
    defragmentation, data mining and data management)
* Penetration Testing: Knowledge of local and remote
  penetrations across Unix and Windows systems.
* Operating Systems: Solaris, SunOS, AIX, HP-UX, OSF/1, SCO,
  *BSD, Linux, Windows, and MacOS.
* Hardware: Extensive knowledge of computer hardware platforms
  and network hardware platforms.


Open Source Software Development
--------------------------------

* snort network intrusion detection system
  (http://www.snort.org):  Core development team member.
* nemesis packet generation tool suite
  (http://jeff.wwti.com/nemesis):  Lead developer.
* cryptcat network utility
  (http://farm9.com/content/Free_Tools/Cryptcat):  Contributing
  developer.


Public Speaking
---------------

* Co-presenter "Large Scale IDS - Network Intrusion Detection
  deployment, data mining and management on a large scale"
  CanSecWest Vancouver, BC May 2002.
* Co-presenter "Layer 2 @ your service" BlackHat briefings Las
  Vegas, NV July 2001.


Professional Affiliations
-------------------------

* Member of the Honeynet Project (http://project.honeynet.org),
  a project dedicated to studying the behavior and techniques
  of the blackhat hacker community.
* Member of Usenix: The Advanced Computing Systems Association.


Education
---------

8/1997 - 12/1999
Arizona State University
Computer Systems Engineering

7/1994 - 12/1995
DePaul University
Computer Science


References
----------

Available upon request.


--
http://jeff.wwti.com            (pgp key available)
"Common sense is the collection of prejudices acquired by age eighteen."
- Albert Einstein

Reply via email to