Daniel started his life in the blackhat arena as many punk kids did, finding his professional rhythm after attending The University of Advancing Technology. He has more than a decade of professional security experience from Juniper Networks, working with the Global Labs Operations team where he designed, built, and managed worldwide R&D, QA, and Competitive intelligence Labs. Daniel figures he has racked, stacked, configured, and crashed every major network vendors routing, switching, and security platform in his time there. Daniel continued his network forensics and exploitation experience working in the full packet capture space and continuing to build his craft working for the DoD in Afghanistan. Daniel enjoys sharing, implementing, and publishing his knowledge of network exploitation and defense while at JASK. As a Senior security Engineer at JASK, Daniel’s greatest gift is mixing his knowledge in security with his passion for business to solve real business problems in security.
In the world of sales, these people find satisfaction in helping people and making businesses more efficient.
Double Pulsar is an SMB injected backdoor and that means alerts will focus on the SMB protocol.
Leverage Apache Spark’s MLlib to bubble up anomalous traffic talking to suspicious countries.
Ads are the massive security hole in our network and the invasive species of our personal lives.
Analysts create phishing email campaign into alerts due to recent Gmail phishing data-uri technique.
How to extract Base64 strings from HTTP URI’s, HTTP Cookies, that are in a network feed.
Instead of staring at rows and columns of big data, beautiful data tells a clearer story of the threat hunter’s findings.
Threat hunting isn’t only about finding compromised assets, it’s about finding the holes a malicious attacker might use.
The number of events generated, is not a metric SOCs should accept as a measure of its health.
Why is the Security Operations Center using endpoint logs to gain the visibility the network data already provides?
When the analyst walks, his playbooks and tribal knowledge on your company usually leave with them.