People the DATASHIELD Differentiator - Learn More About Our Personnel Here
Director of Security Operations
Dave runs all of DATASHIELD's security operations include the SOC and Cyber Threat Intelligence teams.
Dave began his security career in the United States Air Force, working as a first-line incident responder and security engineer. Following his military service, he was a network security analyst for the Army Defensive Cyber Operations Division (DCOD), performing incident response, analysis, and forensics for all Army installations within the continental United States.
From there, David took a position at DATASHIELD, working as a senior security analyst specializing in threat hunting and network forensics. After the ADT acquisition of DATASHIELD, David was promoted to Director of Security Operations, where he now leads analyst and threat intelligence teams in the DATASHIELD Security Operations Center.
Carbon Black is a suite of cloud-based security solutions that provides a variety of endpoint focused tools. Carbon Black labels this single agent, console and platform as the CB Predictive Security Cloud. At the core of Carbon Black’s endpoint sec...Read More
Microsoft released a notice today concerning two vulnerabilities, which would result in a Remote Code Execution vulnerability against the Remote Desktop Services. These are being tracked under CVE-2019-1181 and CVE-2019-1182. This is akin the previo...Read More
This Hash-Time Breakdown focuses on cyber security solution scoping, specifically, when deciding if you need a Security Information and Event Management (SIEM) device or not. Also which SIEM should you choose for your environment.Listen & Read More
Measuring ROI in Cybersecurity, human augmentation and stories about insurance. All this and more including taking a phone call from a listener, designed to illustrate a real-life phishing / social engineering situation. Dave and Jeff prepare for their talk on emerging trends for RSA TechFest and Chris ponders replacing his hands.Listen & Read More
Data privacy issues including news about Google paying $170 million for violating children’s privacy on YouTube and Twitter CEO Jack Dorsey hacked via SMS Tweeting. Also discussion around cyber security acquisitions including Palo Alto Networks acquiring Zingbox for IoT security. Breach of the week surrounding an Android Trojan called Joker and a preview of Dave & Jeff (DATASHIELD) at RSA TechFestListen & Read More
Ransomware themed show along with an in-depth conversation about the problems with sales in cyber security. Feature dumping, vendor bias, sales person technical expertise and more. Dave, Chris and Jeff welcome guest DJ Jones Director of Sales for DATASHIELD.Listen & Read More
Physical Pentesting, Spotsylvania Phishing Attack, Second Life, DEF CON and New Wardialing Variations. Dave, Chris, Jeff and guest Ben Johnson talk about these topics and more hot cybersecurity news. Beach of the week: Forbes.com report on exposed fingerprints and facial recognition data.Listen & Read More
This week the Hash-Time hosts welcome Chase Hall to discuss Gerrymandering, Election Fraud, Voter Hacking, Cybersecurity Movies and News of the Week.Listen & Read More
On this week's show the Hash-Time hosts welcome Joel Menk to discuss the last 10 years of cybersecurity along with news of the week and play the IT Search Term Game.Listen & Read More
On today's show the Hash-Time hosts discuss the one thing you would change about the internet and whether or not the perimeter is dead. Also cybersecurity news and breaches for the week.Listen & Read More
This week the Hash-Time hosts discuss news of the week, and that time the SOC had a gun threat.Listen & Read More
On today's show the Hash-Time hosts cover cybersecurity tool development, what every InfoSec employee needs to know and dive into the anatomy of a ransomware attack.Listen & Read More
On today's show your Hash-Time hosts cover topics including Artificial Intelligence, Automation, Machine Learning as well as try to figure out if Google is Skynet. Plus hot cybersecurity news for the week.Listen & Read More
The Insight Partners acquisition of Recorded Future for $780 Million plus Digital Shadows research uncovers over 2.3 billion files exposed across misconfigured online file storage technologies. The Hash-Time Hosts cover DATASHIELD’s participation at the 2019 Rocky Mountain Information Security Conference (RMISC). All this and, Chris Vincent (Marketing) reads real cyber security targeted sales emails to Jeff Marshall (CISO) & Dave Norlin (SOC Director), both trained and tenured security professionals.Listen & Read More
What is your key marker for business success? How do you develop employee's growth? How do you track personal growth? These questions plus news of the week including Baltimore Bitcoin Ransomware, Spoofing DuckDuckGo and the Cyber No-Fly list. The Hash-Time hosts also cover the history of Security Information and Event Management (SIEM).Listen & Read More
BlueKeep Remote Desktop Exploits, Equifax outlook downgraded because of cyber attack and WannaCry-Infested Laptop starts at $1.13M in art auction. These news stories plus The Hash-Time Show hosts cover their biggest professional challenges and theorize about cloning a top security analyst.Listen & Read More
The Trend Micro Hack & Symantec Denies Claims of “Fxmsp” Breach plus ranking the best and worst hacking movies of all time. Including discussion of the following films: The Matrix (1999), Hackers (1995), WarGames (1983), Swordfish (2001), Ghost in the Shell (1996), Live Free or Die Hard (2007), Blackhat (2015), AntiTrust (2001), Johnny Mneomic (1995), The Net (1995).Listen & Read More
The White House cyber-workforce initiative, one-ring phone scams and Mirrorthief cybercrime group target online campus stores with card skimming malware. These cyber security news stories plus a deep dive into the Packet Advantage.Listen & Read More
Cyber Security News discussing cybersecurity programs on college campuses, FBI director Wray phishing campaign, Docker breach and how Blue Team cyber detectives take a bite out of crime.Listen & Read More
The Threat Analyst position will be responsible for reviewing & understanding the customer security profile, critical assets and what security tools/devices are on their network. Using this information, the Threat Analyst will do active hunting for anomalies, vulnerabilities & potential/existing threats in the customer environment. This position will need to learn what the customer has, potential issues and work with the SOC to alert and with the threat content team to expand ShieldVision alerts, content and/or reports. This position will be involved in all SEV/TIER 1 activities. Secondarily this role will assist the threat content team in training and mentorship of SOC analysts.
We are looking for a L2 SOC Analyst to join the DATASHIELD Advanced Security Operations Center. Your primary responsibilities will be analyzing and finding threats in various systems, including Splunk, RSA Netwitness, Cofense Triage, and Mimecast/Proofpoint.