Chris Jenks
Details
Cybersecurity and Buisness Administration
University of Maryland University College
2015 : 2019
Master's Certificate
Digital Forensics
University of Maryland University College
2018 : 2018
Bachelor of Science (B.S.)
Applied Information Assurance
Eastern Michigan University
2012 : 2014
Associates
Computer Information Systems and General Studies (Anthropology)
Henry Ford Community College
1996 : 2005
Design training and implement training for the help desk team to get exposure to Cybersecurity work for possible future promotions.
Perform internal audits on server, network, and endpoint devices.
Write Requests for Proposals and review vendor proposals for outsourced Cybersecurity services.
Write business justification proposals for Cybersecurity initiatives
Work with external auditors and penetration testers for company risk assessment and testing.
Perform third-party risk assessments based on questionnaires and interviews with potential vendors.
Improve user awareness training programs, including video learning and phishing simulation.
Improve metrics collection for the phishing simulation program
Perform Incident Response work with root cause analysis for Cybersecurity events.
Lead Incident Response activities that require cross-team and division personnel.
Redesign, rewrite, and maintain Information Security Policy.
Lead cross-department projects to reduce operating costs and improve company security posture.
Represent the company as the point of contact for supply chain audits from customers.
Designed and implemented a proof of concept for a low-level honey pot to improve internal monitoring.
Work with existing vendors on contract renewals.
Participate in the twice-a-week Change Control Board.
Implemented several Center for Internet Security baseline controls for Exchange Online.
Created plan for Role Based Access Control for hybrid IAM Active Directory service.
Assist other IT Departments with proposals for their RFPs, reviewing proposals and comparing them to RFP requirements.
2023 : Present
Private company
Cybersecurity Manager
Managed a 12-person Global Security Operations Center.
Planned and built Security Operations Center from single analyst to 24x7 monitoring and dispatch SOC Service, with Incident Response abilities for internal investigations.
Designed planning document for department goals and position requirements.
Designed employee growth path from Level 1 to Level 3 analyst roles.
Designed new SOC employee training program.
Found and established a new hiring pipeline.
Reviewed potential candidate resumes in the HR portal.
Interviewed and hired staff.
Provided staffing forecasting requirements based on department needs.
Provided budgetary numbers for training, hardware, and software needs.
Worked with the Governance and Risk, and Compliance managers to review and update company policies.
Wrote company policies related to security operations.
Wrote lessons learned that were shared with Governance and Risk, and Compliance departments to improve policies and company risk posture.
Designed and lead internal Tabletop exercises.
Designed and facilitated external customer and public Tabletop training exercises.
Involved with creating the contract used for Managed SOC Services to sell to customers.
Security evangelist.
Wrote Security articles for marketing's company blog.
Lead Internal Incident Response.
SOC Incident Advisor to customers during their incidents.
Wrote internal briefs for staff and customer support managers for emerging threats.
Provided and presented SOC service metrics at monthly customer meetings.
Support SOC customers in Government Cloud and Commercial cloud space
2022 : 2023
Coretek
Security Operations Center (SOC) Manager
Provide Threat Intelligence for a company in multiple critical infrastructure sectors.
Review internal data and external data feeds to build context around Indicators of Compromise.
Update Threat Intelligence Platform with contextual information to generate alerts, and assist Detection analysts with why the alert triggered.
Perform Open Source Intelligence (OSINT) investigations to support other departments outside of the Security Operation Center (SOC).
Work with the DNS department to monitor for newly registered domains infringing on the company's brand.
Work with the company's vulnerability management team to know about new vulnerabilities as they become known.
Use Link Analysis on external views of the network to evaluate and recommend improvements to the company's footprint.
Write Unix shell and Python scripts to automate repetitive tasks and improve data collection.
Provide training to junior analysts in detection, incident response, and threat intelligence.
Write Python and Shell scripts to automate repetitive work.
Investigate new tools to be used in the company's SOC.
Interface with vendors on products, and troubleshoot problems with product use.
Lead internal projects as needed.
Designed internal training programs and researched new training vendors for improved training of the SOC.
Presented in a company-wide program on the role of Threat Intelligence with the focus to improve IT to IT security relations and as a potential recruitment platform.
2017 : 2022
Ford Motor Company
Cyber Threat Intelligence Analyst
Designing and teaching IA-622 – Risk Management and Incident Response. Re-designed the course to use the Factor Analysis of Information Risk (FAIR) instead of the NIST Risk Management framework. The incident response portion is focused on IR team leadership.
Taught IA-240 – Intelligence Analysis 1 – The course was designed to introduce students to critical thinking and intelligence analysis. It covered the history of intelligence, tradecraft, analytic techniques, and all-source intelligence analysis. The hands-on labs included Open Source Intelligence and Signals Intelligence using the Intelligence lifecycle. All assignments were written reports with a presentation.
2019 : 2020
Eastern Michigan University
Part-time Lecturer
Worked in the Cyber Security Center on the Computer Security Incident Response Team.
Created metrics based on log data and ticket system.
Used Human Intelligence, Open Source Intelligence, and Signal Intelligence (emails and logs) to analyze different threat patterns and look for possible new threat patterns.
Used Open Source Intelligence to investigate people and industry-related events.
Searched the Deep Web and Dark Web for Company Proprietary Information and accounts.
Wrote drafts for new company policies, based on found gaps in the existing policy.
Support the Incident Detection and Remediation team by assisting with the backlog of tickets.
Wrote Python and Shell scripts for automation of processes.
Started a multi-department study group for learning Python.
2015 : 2017
Molina Healthcare
Cyber Threat Intelligence Analyst
Skills
Active Directory, Cisco Technologies, Cyber Attack Analysis, Cybercrime Investigation, Cybersecurity, Data Center, Disaster Recovery, Firewalls, Identity & Access Management (IAM), Information Assurance, Information Security, Information Security Analysis, Intelligence Analysis, Intelligence Applications, Intelligence Fundamentals, Investigation, IOCs (Indicators Of Compromise), Leadership, Linux, Lock Picking, Network Administration, Network Design, Networking, Network Security, Open Source Intelligence, Operating Systems, Penetration Testing, Physical Security, Public Speaking, Python (Programming Language), Risk Analysis, Risk Assessment, SAN, Security, Security Incident Response, Shell Scripting, Storage Area Network (SAN), System Administration, Threat Intelligence, Training, Troubleshooting, Virtual Private Network (VPN), VPN, Vulnerability Assessment, Windows Server, Wireless Intrusion Detection System, Wireless Networking, Writing
About
Information security professional, public speaker, published author, and information technology trainer. I have experience in physical and technical security, network monitoring, network administration, and Unix and Linux administration. I am familiar with network and digital forensics, incident response, and intelligence analysis.
I like to take information available and map it out, be it mapping out data from cities to geographical location, or mapping out the location and design of the network.
I review different technologies in my home lab related to information security. Items that have been worked on in my lab include: single board computers used to build Wireless Intrusion Detection Systems, pfSense as a stand alone appliance and as a virtual appliance on VMWare, Alien Vault and Security Onion as SIEM devices.