Personal Information
Occupation
Principal Security Author
Industry
Technology / Software / Internet
Website
www.devaultsecurity.com
Tags
cybersecurity
conference
threat hunting
elastic stack
incident response
log4shell
log4j
infosec
zeek
emulation
vulnerability
elasticsearch
open source
circlecitycon
purpleteam
hacking
pluralsight
fin7
grrcon
suricata
rocknsm
bsides
scheduled tasks
information security
blueteam
microsoft
alamo ace
air force
code
exploit
dcerpc
mitm
sccm
shellshock
heartbleed
crowdstrike
identity
azure
security engineering
security operations
adversary emulation
toolkit
windows
persistence
shmoocon
wireshark
c2
exfiltration
smtp
lateral movement
phishing
apt
suricon
dashboards
mitre
training
education
devsecops
isf
texas
development
See more
Presentations
(15)Likes
(1)Automated, Collection, and Enrichment (ACE)
Jared Atkinson
•
8 years ago
Personal Information
Occupation
Principal Security Author
Industry
Technology / Software / Internet
Website
www.devaultsecurity.com
Tags
cybersecurity
conference
threat hunting
elastic stack
incident response
log4shell
log4j
infosec
zeek
emulation
vulnerability
elasticsearch
open source
circlecitycon
purpleteam
hacking
pluralsight
fin7
grrcon
suricata
rocknsm
bsides
scheduled tasks
information security
blueteam
microsoft
alamo ace
air force
code
exploit
dcerpc
mitm
sccm
shellshock
heartbleed
crowdstrike
identity
azure
security engineering
security operations
adversary emulation
toolkit
windows
persistence
shmoocon
wireshark
c2
exfiltration
smtp
lateral movement
phishing
apt
suricon
dashboards
mitre
training
education
devsecops
isf
texas
development
See more