Jonathan Chase Hudson
Details
Federal Reserve Bank of Philadelphia
Information Security Sr. Manager (Operations)
2020 :
Federal Reserve Bank of Philadelphia
Information Security Manager (IS Operations)
My passion for cybersecurity and my background with both KPMG and U.S. Army Cyber Command have given me a unique perspective into the ever-changing cyber threat landscape and the innovative solutions needed to defend modern-day IT & OT/ICS environments. With over 7 years of experience planning, designing, managing, securing, and assessing federal networks and systems, I provide to clients a deep knowledge of cybersecurity standards, architectures, processes, and solutions and the know-how to design, implement, and maintain a secure, compliant environment that manages cyber risk and meets their business needs.
2019 : 2020
KPMG US
Sr Associate - Advisory - Government Cybersecurity
As a Plans Officer, I oversaw a team of 10+ planners and intelligence analysts in analyzing network vulnerabilities, crafting red team plans, and digesting threat intelligence. I was also responsible for advising senior leaders and drafting organizational mission statements, goals, and objectives.
As a Red Team Lead, I guided my team to the successful implementation of red team engagements, accounted for and mitigated risks, and drafted technical reports and deliverables. I based my engagement methodology on the Cyber Kill Chain and MITRE ATT&CK frameworks.
Finally, I was chosen to serve as the Acting Senior Manager for a period of three months. During this time, I led my team to achieve multiple organizational “firsts” and was recognized for my ability to effectively communicate technical matters with non-technical customers and senior leaders.
2017 : 2019
U.S. Army Cyber Command
Cyber Plans Lead
I was recruited to be the Program Manager for an ICS/SCADA vulnerability analysis and software development program. Together, we developed world-class ICS security solutions and delivered more than 10 products to our customers, resulting in over $1 million in new business. I also implemented the AGILE SCRUM methodology and incorporated the use of the Atlassian Suite (Jira & Confluence), greatly increasing productivity.
I spent some time as a Software Developer, where I utilized Python, Android Studio, Kali Linux (and its various penetration testing tools), and the IntelliJ IDEA. This was a start-up effort so I spent time engineering and installing our development network/services. I installed COTS and open-source software including Ubuntu Server, VMWare, Ruby Gems (mirrored repository), and the Atlassian Suite (Jira/Confluence/Bitbucket). I also had to configure numerous Cisco routers and switches.
During my personal time, I conducted professional development by working on man-in-the-middle and SSL bypass, browser security, and mobile application security tools with Kali Linux, Metasploit, Burp Suite, Android Studio, and the Brower Exploitation Framework.
2016 : 2017
U.S. Army Cyber Command
Program Manager
About
My strong understanding of cyber actors’ tactics, techniques, and procedures (TTPs), experience assessing IT & OT/ICS environments for security gaps and vulnerabilities, know-how of state-of-the-art cyber defenses, and military Cyber background make me a powerful ally in the fight to keep your networks secure!
You'll also find I'm an adept leader of teams and programs, with experience directing all sizes from a small 10+ person software development program to a mid-size 150+ person network engineering and telecommunications company. I have also managed budgets and inventories valued in excess of $45M.
Certifications include: ISC2 Certified Cloud Security Professional (CCSP), Cisco CyberOps Associate, CCNA Routing & Switching, CompTIA Security+ and Network+, and CEH.
Competencies include: Windows, Linux (Ubuntu, Kali, Security Onion), Cisco, Android Studio, Python, ServiceNow, Atlassian Jira/Confluence, various security monitoring tools (Splunk, Wireshark, Snort), various penetration testing tools (NMAP, Metasploit, Burp Suite, Mobile Security Framework, Browser Exploitation Framework), NIST frameworks, FedRAMP, and Microsoft Office (Word, Excel, PowerPoint, Project).