Ron Eddings

Ron Eddings Ron Eddings is an influencer

Amplifying Cybersecurity Through Content | GenAI Security Researcher | Author of Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets

Austin, Texas, United States
25K followers 500+ connections

About

Technologists are mental athletes with no off-season. The constant need to learn, improve, and iterate creates friction in the life of technologists, stifling both creativity and innovation. My mission is to inspire, empower and uplift the technology community through knowledge and human stories so that others have the opportunity to reach their set potential. Technology and my life's mission both require a lifetime commitment to learning and teaching. Each opportunity to gain a rare and valuable skill is an opportunity to gain personal and financial freedom. By exploring the intersection between humanity and technology, I hope to help others uncover their potential and realize their freedom.

Activity

Join now to see all activity

Experience

  • Hacker Valley Media Graphic

    Founder & Executive Producer

    Hacker Valley Media

    - Present 7 years 1 month

    https://hackervalley.com

    Listen, sponsor, and get featured on our award-winning cybersecurity podcasts & videos.
    We are a cybersecurity media company with 6 different podcasts and video shows and one mission: to share the most powerful stories in cyber in creative ways. We strive to live outside the bits and bytes of technology and focus on the human element. Our niche shows have something for everyone - from getting started in cyber to red teaming, being a CISO, and cyber marketing.

  • Mozilla Graphic

    GenAI Security Researcher

    Mozilla

    - Present 1 year 10 months

  • Axonius Graphic

    Creative Director, Attack Surface Management SME

    Axonius

    - 1 year 6 months

    Responsible for creating and delivering Attack Surface Management (ASM) training, video, and written content and helped grow the Axonius brand. Also served as a cybersecurity advocate speaking at conferences globally. My team helped Axonius grow from 7% to 21% in aided recall survey.

  • Marqeta, Inc Graphic

    Sr. Manager, Detection And Response

    Marqeta, Inc

    - 11 months

    As a detection and response leader, my responsibility is to motivate and inspire team members to create learn, create and innovate. As a result, the Detection and Response team implemented security solutions, policies, and guidelines that helped the organization freely innovate. Outside of technical innovation, my focus was to present security challenges and opportunities as stories for team members to understand and relate to. Other responsibilities include:
    - Identify, document, and…

    As a detection and response leader, my responsibility is to motivate and inspire team members to create learn, create and innovate. As a result, the Detection and Response team implemented security solutions, policies, and guidelines that helped the organization freely innovate. Outside of technical innovation, my focus was to present security challenges and opportunities as stories for team members to understand and relate to. Other responsibilities include:
    - Identify, document, and automate security workflows
    - Provide team members an environment to thrive in
    - Manage relationships with team members, stakeholders,and vendors
    - Onboard technology solutions that promote and enhance security for the organization

  • Demisto

    Demisto

    3 years

    • Demisto Graphic

      Security Architect, Automation Architect

      Demisto

      - 3 years

      San Francisco Bay Area

      As a Security Architect, I am responsible for leading technical discussions with clients to help them understand and implement desired security solutions.

      • Develop and implement Machine Learning models to de-duplicate multiple incidents from a single Malicious campaign in efforts to help reduce Mean Time To Respond (MTTR) for clients and provide customer security and satisfaction.
      • Research on latest threats and malicious content to create and implement the most effective practices…

      As a Security Architect, I am responsible for leading technical discussions with clients to help them understand and implement desired security solutions.

      • Develop and implement Machine Learning models to de-duplicate multiple incidents from a single Malicious campaign in efforts to help reduce Mean Time To Respond (MTTR) for clients and provide customer security and satisfaction.
      • Research on latest threats and malicious content to create and implement the most effective practices for identifying, alerting, and proactively preventing related incidents via Python/Javascript automation scripts.
      • Conduct threat-hunting and solution-based procedures training to cross functional staff and collaborate with senior management for the development, optimization and implementation of workflows to establish a cohesive unit.
      • Provide technical knowledge in software design, management and execution.
      • Oversee product onboarding, Mentoring and Coaching, and onsite troubleshooting.

    • Palo Alto Networks Graphic

      Manager, Security Architect

      Palo Alto Networks

      - 3 years

      San Francisco Bay Area

      As a Security Architect leader, I'm responsible for facilitating growth for others and consistently creating a pipeline of security leaders. Our team is highly effective when planning, designing, and implementing security controls for enterprise organizations. In addition, our team of security architects are leaders in creating security policies, standards, and guidelines. During implementation, our team assists enterprise organizations with the following:
      • Detection engineering
      • Case…

      As a Security Architect leader, I'm responsible for facilitating growth for others and consistently creating a pipeline of security leaders. Our team is highly effective when planning, designing, and implementing security controls for enterprise organizations. In addition, our team of security architects are leaders in creating security policies, standards, and guidelines. During implementation, our team assists enterprise organizations with the following:
      • Detection engineering
      • Case management
      • Creating and automating incident responses processes
      • Creating automation via Python and Javascript
      • Threat Intel Management

    • Palo Alto Networks Graphic

      Threat Intelligence

      Palo Alto Networks

      - 3 years

      As a Security Architect, I assist organizations collect, assess, and apply threat intelligence to security controls. I've leveraged threat intelligence to provide context for security threats, threat actors, exploits, malware, vulnerabilities, and compromised indicators. Additionally, I've applied automation efforts to threat intelligence to further reduce the mean time to detect (MTTD) and mean time to respond (MTTR).

    • Palo Alto Networks Graphic

      Security Orchestration, Automation and Response (SOAR)

      Palo Alto Networks

      - 3 years

      As a Security Architect, I've implemented and scaled security automation for production workflows. Leveraging SOAR products and methodologies, I've assisted enterprise organizations with case management, automation/orchestration, incident response and chatops. I've created SOAR playbooks for the following use cases:
      • Phishing
      • Malware Infection
      • Data Loss Prevention (DLP)
      • Employee onboard/offboarding
      • Destroy/Recreate Cloud Instance
      • Suspicious User Login

  • Intel Corporation Graphic

    Cyber Fusion Analyst (Threat Intel and Intrusion Prevention)

    Intel Corporation

    - 1 year 3 months

    San Francisco Bay Area

    As a Cyber Fusion Analyst, I maintained real-time awareness of cyber activity and potential vulnerabilities, malware, and threats that have the potential to affect users and the system. Collected, synthesized, summarized data and incident reports.

    Key Accomplishments:
    • Gathered and interpreted internal and open-source threat intelligence to successfully complete the building, optimization, and automation of the threat research platform in order to prevent further threats.
    •…

    As a Cyber Fusion Analyst, I maintained real-time awareness of cyber activity and potential vulnerabilities, malware, and threats that have the potential to affect users and the system. Collected, synthesized, summarized data and incident reports.

    Key Accomplishments:
    • Gathered and interpreted internal and open-source threat intelligence to successfully complete the building, optimization, and automation of the threat research platform in order to prevent further threats.
    • Provided Basic and Advanced-level Threat Identification, hunting, analysis, and training to both the Security Operations Center (SOC) and the Advanced Persistent Threat (APT) hunt team.
    • Created Threat Intel Framework API and User Interfaces (UI) by leveraging the Sails JS, Node JS, and MySQL.
    • Participated in Agile and Extreme Programming (XP) activities for further skill acquisition and advancement.
    • Created several Application Programming Interfaces (APIs) to interact with multiple security products in a single query.
    • Exposed to a dynamic, fast-paced environment working to anticipate, identify, and respond to cyber attacks.

  • McAfee Graphic

    Security Researcher

    McAfee

    - 2 years 4 months

    As a Security Researcher, I researched on the latest threats and Malware Trends to develop ways to identify and resolve them; Studied the structures of Malicious software and gained insight of exploits, malicious command and control mechanisms, and malicious tactics, techniques and procedures (TTPs).

    Key Accomplishments:
    • Created a framework that enumerates devices on IPv6 enabled networks.
    • Utilized, analyzed, and applied machine learning models to data samples to predict…

    As a Security Researcher, I researched on the latest threats and Malware Trends to develop ways to identify and resolve them; Studied the structures of Malicious software and gained insight of exploits, malicious command and control mechanisms, and malicious tactics, techniques and procedures (TTPs).

    Key Accomplishments:
    • Created a framework that enumerates devices on IPv6 enabled networks.
    • Utilized, analyzed, and applied machine learning models to data samples to predict malicious binaries.
    • Developed, executed, and maintained a framework that is able to ingest Android binaries and return indicators of malicious activity; Leveraged Interactive Disassembler (IDA Pro) to perform static analysis of binaries.
    • Authored internal research papers focused on identifying clean, suspicious, and malicious Android applications.
    • Installed and managed ElasticSearch and MongoDB instances to store threat data to help prevent future threats.

  • Booz Allen Hamilton Graphic

    Offensive Security Engineer and Analyst

    Booz Allen Hamilton

    - 3 years 8 months

    Performed research, analysis, and reconstruction of security controls in efforts to find vulnerabilities and perform exploitation
    - Provided Subject Matter Expert (SME) security analysis and protocol analysis mentorship to clients.
    - Facilitated analyst focus groups and discussions between intelligence community groups
    - Instructed and mentored security engineers and analysts to create Python scripts to quickly analyze log data.
    - Utilized Open source and classified material to…

    Performed research, analysis, and reconstruction of security controls in efforts to find vulnerabilities and perform exploitation
    - Provided Subject Matter Expert (SME) security analysis and protocol analysis mentorship to clients.
    - Facilitated analyst focus groups and discussions between intelligence community groups
    - Instructed and mentored security engineers and analysts to create Python scripts to quickly analyze log data.
    - Utilized Open source and classified material to locate high-interest communications networks in efforts to identify security vulnerabilities.

Education

Licenses & Certifications

Skills

Recommendations received

More activity by Ron

View Ron’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ron directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses