Call for Incident Response

866.428.4567

Meet Our Team

People the DATASHIELD Differentiator - Learn More About Our Personnel Here

Dave Norlin

Director of Security Operations

Dave runs all of DATASHIELD's security operations include the SOC and Cyber Threat Intelligence teams.

Dave began his security career in the United States Air Force, working as a first-line incident responder and security engineer. Following his military service, he was a network security analyst for the Army Defensive Cyber Operations Division (DCOD), performing incident response, analysis, and forensics for all Army installations within the continental United States.

From there, David took a position at DATASHIELD, working as a senior security analyst specializing in threat hunting and network forensics. After the ADT acquisition of DATASHIELD, David was promoted to Director of Security Operations, where he now leads analyst and threat intelligence teams in the DATASHIELD Security Operations Center.

Dave Norlin

's Resource Library Contributions

Carbon Black: Managed Endpoint Detection & Response (EDR)Carbon Black: Managed Endpoint Detection & Response (EDR)

Carbon Black is a suite of cloud-based security solutions that provides a variety of endpoint focused tools. Carbon Black labels this single agent, console and platform as the CB Predictive Security Cloud. At the core of Carbon Black’s endpoint sec...

Read More
Microsoft Releases Notice of More RDP VulnerabilitiesMicrosoft Releases Notice of More RDP Vulnerabilities

Microsoft released a notice today concerning two vulnerabilities, which would result in a Remote Code Execution vulnerability against the Remote Desktop Services. These are being tracked under CVE-2019-1181 and CVE-2019-1182. This is akin the previo...

Read More
The Packet AdvantageThe Packet Advantage

Listed below are the top 7 reasons why packets are superior to logs alone.1) Root cause analysis – Logs usually provide insight into how devices responded, but full packet capture tells the story of what actually happened. Packet data eliminates...

Read More

Dave Norlin

's Podcast Apperances

Hash-Time Breakdown - Cyber Security Solution ScopingHash-Time Breakdown - Cyber Security Solution Scoping

This Hash-Time Breakdown focuses on cyber security solution scoping, specifically, when deciding if you need a Security Information and Event Management (SIEM) device or not. Also which SIEM should you choose for your environment.

Listen & Read More
Episode #17 - Measuring ROI in Cyber SecurityEpisode #17 - Measuring ROI in Cyber Security

Measuring ROI in Cybersecurity, human augmentation and stories about insurance. All this and more including taking a phone call from a listener, designed to illustrate a real-life phishing / social engineering situation. Dave and Jeff prepare for their talk on emerging trends for RSA TechFest and Chris ponders replacing his hands.

Listen & Read More
Episode #16 - Data Privacy, Cyber Security Acquisitions & RSA Tech FestEpisode #16 - Data Privacy, Cyber Security Acquisitions & RSA Tech Fest

Data privacy issues including news about Google paying $170 million for violating children’s privacy on YouTube and Twitter CEO Jack Dorsey hacked via SMS Tweeting. Also discussion around cyber security acquisitions including Palo Alto Networks acquiring Zingbox for IoT security. Breach of the week surrounding an Android Trojan called Joker and a preview of Dave & Jeff (DATASHIELD) at RSA TechFest

Listen & Read More
Episode #15 - Ransomware & The Problems with Sales in Cyber SecurityEpisode #15 - Ransomware & The Problems with Sales in Cyber Security

Ransomware themed show along with an in-depth conversation about the problems with sales in cyber security. Feature dumping, vendor bias, sales person technical expertise and more. Dave, Chris and Jeff welcome guest DJ Jones Director of Sales for DATASHIELD.

Listen & Read More
Episode #14 - Physical Pentesting, Personal Intimate Devices & WardialingEpisode #14 - Physical Pentesting, Personal Intimate Devices & Wardialing

Physical Pentesting, Spotsylvania Phishing Attack, Second Life, DEF CON and New Wardialing Variations. Dave, Chris, Jeff and guest Ben Johnson talk about these topics and more hot cybersecurity news. Beach of the week: Forbes.com report on exposed fingerprints and facial recognition data.

Listen & Read More
Episode #13 - Gerrymandering & Cybersecurity MoviesEpisode #13 - Gerrymandering & Cybersecurity Movies

This week the Hash-Time hosts welcome Chase Hall to discuss Gerrymandering, Election Fraud, Voter Hacking, Cybersecurity Movies and News of the Week.

Listen & Read More
Episode #12 - The Last Ten Years in CybersecurityEpisode #12 - The Last Ten Years in Cybersecurity

On this week's show the Hash-Time hosts welcome Joel Menk to discuss the last 10 years of cybersecurity along with news of the week and play the IT Search Term Game.

Listen & Read More
Episode #11 - The One Thing You Would Change About the InternetEpisode #11 - The One Thing You Would Change About the Internet

On today's show the Hash-Time hosts discuss the one thing you would change about the internet and whether or not the perimeter is dead. Also cybersecurity news and breaches for the week.

Listen & Read More
Episode #10 - That Time the SOC had a Gun ThreatEpisode #10 - That Time the SOC had a Gun Threat

This week the Hash-Time hosts discuss news of the week, and that time the SOC had a gun threat.

Listen & Read More
Episode #9 - Cybersecurity Tools & What Every InfoSec Employee Needs to KnowEpisode #9 - Cybersecurity Tools & What Every InfoSec Employee Needs to Know

On today's show the Hash-Time hosts cover cybersecurity tool development, what every InfoSec employee needs to know and dive into the anatomy of a ransomware attack.

Listen & Read More
Episode #8 - AI, Automation, Machine Learning & SkynetEpisode #8 - AI, Automation, Machine Learning & Skynet

On today's show your Hash-Time hosts cover topics including Artificial Intelligence, Automation, Machine Learning as well as try to figure out if Google is Skynet. Plus hot cybersecurity news for the week.

Listen & Read More
Episode #7 - Reading Sales EmailsEpisode #7 - Reading Sales Emails

The Insight Partners acquisition of Recorded Future for $780 Million plus Digital Shadows research uncovers over 2.3 billion files exposed across misconfigured online file storage technologies. The Hash-Time Hosts cover DATASHIELD’s participation at the 2019 Rocky Mountain Information Security Conference (RMISC). All this and, Chris Vincent (Marketing) reads real cyber security targeted sales emails to Jeff Marshall (CISO) & Dave Norlin (SOC Director), both trained and tenured security professionals.

Listen & Read More
Episode #6 - Developing a Cybersecurity TeamEpisode #6 - Developing a Cybersecurity Team

What is your key marker for business success? How do you develop employee's growth? How do you track personal growth? These questions plus news of the week including Baltimore Bitcoin Ransomware, Spoofing DuckDuckGo and the Cyber No-Fly list. The Hash-Time hosts also cover the history of Security Information and Event Management (SIEM).

Listen & Read More
Episode #5 - Cloning a Top Security AnalystEpisode #5 - Cloning a Top Security Analyst

BlueKeep Remote Desktop Exploits, Equifax outlook downgraded because of cyber attack and WannaCry-Infested Laptop starts at $1.13M in art auction. These news stories plus The Hash-Time Show hosts cover their biggest professional challenges and theorize about cloning a top security analyst.

Listen & Read More
Episode #4 - Ranking Hacking MoviesEpisode #4 - Ranking Hacking Movies

The Trend Micro Hack & Symantec Denies Claims of “Fxmsp” Breach plus ranking the best and worst hacking movies of all time. Including discussion of the following films: The Matrix (1999), Hackers (1995), WarGames (1983), Swordfish (2001), Ghost in the Shell (1996), Live Free or Die Hard (2007), Blackhat (2015), AntiTrust (2001), Johnny Mneomic (1995), The Net (1995).

Listen & Read More
Episode #3 - The Packet AdvantageEpisode #3 - The Packet Advantage

The White House cyber-workforce initiative, one-ring phone scams and Mirrorthief cybercrime group target online campus stores with card skimming malware. These cyber security news stories plus a deep dive into the Packet Advantage.

Listen & Read More
Episode #2 - Cyber DetectivesEpisode #2 - Cyber Detectives

Cyber Security News discussing cybersecurity programs on college campuses, FBI director Wray phishing campaign, Docker breach and how Blue Team cyber detectives take a bite out of crime.

Listen & Read More
Episode #1 - Why Passwords Must DieEpisode #1 - Why Passwords Must Die

Inaugural episode for The Hash-Time Show - Cyber Security Podcast. Discussion around new packet compression techniques from the US Army and why passwords must die!

Listen & Read More

Dave Norlin

's Job Openings

Threat Content Engineer

Security Operations

The Threat Analyst position will be responsible for reviewing & understanding the customer security profile, critical assets and what security tools/devices are on their network. Using this information, the Threat Analyst will do active hunting for anomalies, vulnerabilities & potential/existing threats in the customer environment. This position will need to learn what the customer has, potential issues and work with the SOC to alert and with the threat content team to expand ShieldVision alerts, content and/or reports. This position will be involved in all SEV/TIER 1 activities. Secondarily this role will assist the threat content team in training and mentorship of SOC analysts.

Read More

Level II SOC Analyst

Security Operations

We are looking for a L2 SOC Analyst to join the DATASHIELD Advanced Security Operations Center. Your primary responsibilities will be analyzing and finding threats in various systems, including Splunk, RSA Netwitness, Cofense Triage, and Mimecast/Proofpoint.

Read More