Media1-production.mightynetworks.com



Peter LazarusMays Landing, NJ PeterALazarus@ | 732.616.5552Qualifications…Promote high level execution, attention to detail, and awareness to complete projects few others can and instilling confidence in clients for continuing patronage.Problem solver, typically called when all else fails or budgets get out of hand to implement hardware, software, and personnel solutions.Repeated success directing security and installation teams from formation to job completion, strategically allocating resources and delegating tasks to accomplish goals with maximum transparency.Installed many entertainment and PC projects, including everything from prepackaged surround sound, to custom gaming consoles with recycled parts and custom PCB microcontroller projects.Hard worker with high level of awareness and strong drive to deliver more than any client asks for. I spent 12 years in a result driven industry in which client satisfaction made or broke career longevity and satisfaction was only guaranteed through a near obsessive attention to detail and intuitive interactions.– Areas of Expertise –Innovative Security Solutions | Leveraging Packet Captures and Scans into Actionable Intelligence | Improvised Hardware Solutions | Vulnerability/Risk Assessment?|?Team Lead?|?Passive Surveillance | Penetration Testing?|?Strategic Planning/Analysis?| Client Consultation & Cultivation |?Business Development/Continuity?? ?Technical ProficienciesPlatformsWindows ‘95-10; Linux Ubuntu, Kali, Redhat Server, Arch, CentOS (built from kernel), Oracle, VMWare, AWS, Cisco CLI, Windows Server 2012 R2SoftwareMicrosoft Office, Metasploit, Burp Suite, Maltego, Wireshark, Active Directory, Adobe PS, Illustrator & Premiere, OpenVAS, Splunk, Armitage, Metasploit, Network Security Tools, Steganography LanguagesJava, HTML, CSS, Java Script, Python?Some recent projects…Currently developing a deployable mesh network in a concealable form factor for on-site penetration testing. Will most likely work it into the mini ITX implant project I am working on. Developed and prototyped a network implant for on-site testing, providing packet captures, pivoting, and remote/on site malware development and deployment and IR motion detection for a smaller footprint in terms of resource usage on the network/power grid.Currently building a SBC prototype into a clipboard, multiboot between Win10 and custom kali kernel. Intended to be used as an implant, rogue ap, or hub to coordinate deployable units and successful implants.Server installs, some cat5 cabling, Cisco enterprise installation/CLI configuration for home/small business networks. Hacked myself a Hachthebox.eu invite, looking forward to competing on the CTF leaderboards.Currently prepared to test for A+, Network+, Security+, Pentest+ and CEH with 30 days prep time, OSCP with 30-60 days study time. Update, wrapped CEH prep and am preparing to schedule exam in the near future (Certifications can get expensive sometimes)Security Specialist Ops, Harrah’s Casino AC 11/2018 - PresentDocument any notable incidents on the property for court filings.Write and track daily logs of all actions taken by the Security team on a given shift.Grant access and surveil man traps in key areas.Scan vulnerable areas for RFID cloners and devices that allow machine interaction.Escort EMT, Brinks deliveries, ATM, and cash room staff.IT Support/Security Specialist July 2000 - PresentCustom Hardware builds, including overclocking and water cooling, small form factor portable PC builds.Provided initial install and system configuration for small businesses including proprietary and specialized softwareProvided help desk and remote desktop support Purchased and set up hardware for home theatres and LANs given some budget and base requirements, always finished under or on budget unless instructed to further development by the clientSecurity Consultant, 1999 - PresentMobile and covert surveillance systems design and implementation for everything from divorce proceedings to private investigation. One implementation ultimately involved a grand jury testimony and conviction in child prostitution case for NYC detectives.Recovered several thousand lists of stolen credit card information to notify institutions and victimsSetup surveillance systems, commercial and custom, for small businesses and security conscious clients. Typically asked to bypass any design flaws I noticed upon initial inspection and update or replace hardware accordingly. I have worked with digital, analog, and combinations of the two.Physical penetration testing using primarily nondestructive means unless otherwise directed. Lock picking and smithing to secure areas, providing detailed reports identifying potential breach points and paths of least work and Web App penetration testing, primarily on small business LANs configured for secure connections, providing solutions to any successful breaches, started testing for bug bounty programs early 2018Elected to head two teams composed of off duty information security professionals to track, document, and ultimately return stolen digital property and accounts. Other Recent Experience… HYPERLINK "" Tattooist, Graphic ArtistStudio 9 Tattoo, West Side Tattoo, Om Tattoo & Piercing…(full list and references available upon request)Dates Apr 2006 – Jul 2018Duration 12 yrs 4 mosNJ, NY HYPERLINK "" Creative Director – Start Up ConsultantCompany Tailored BlendsDates Nov 2016 – Jun 2018Duration 1 yr 8 mos HYPERLINK "" Home Health AideIndependent:Dates Aug 2016 – Jun 2017Employment Duration11 mosRed Bank, NJ HYPERLINK "" Business OwnerCompany Larger Than Life TattooDates Feb 2016 – Jun 2017Employment Duration 1 yr 5 mosAsbury Park, NJEducation HYPERLINK "" Brookdale Community CollegeDegree AssociateField Of Study: Network Information and Technology (formerly Networking), Computer ScienceGPA 3.47Dates: 2015?–?2018A comprehensive Networking program, prepped for CCNA cert in 2 semesters (4 textbooks). Built Linux from kernel and trained for PC Repair and Cabling. Some courses covered:CCNA, Linux Admin (CentOS, Redhat), TCP/IP, Security, Digital Forensics, Hacker Tech tools & Incident Response, Win Server 2012 R2, Win 7-10, Juniper ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download