Resume
BRIAN OBERLIES
Denver, CO 80238 | 1.603.851.0996 | boberlies21@gmail.com
https://www.linkedin.com/in/brian-oberlies-a84493110/
___________________________________________________________________________________________________________________________________________
Security Analyst
Linux and Windows Operating Systems | Mitigate System Vulnerabilities | Networking | Research
Detail-oriented security analyst proficient in Linux and Windows operating systems, command line execution, scripting, network security, cryptography and SIEMs. Holds a certificate from University of Denver’s Cybersecurity Bootcamp and in the process of obtaining CompTIA Security+ certificate. An intuitive, forward-thinking problem solver who brings technical aptitude and an understanding of corporate business processes. Proven success in leveraging industry-standard tools such as the command terminal, Wireshark, Burp Suite, Metasploit, Meterpreter, and Splunk to identify system vulnerabilities and harden existing systems to prevent and mitigate future breaches. Technology and security enthusiast who is motivated by teamwork and innovation.
TECHNICAL SKILLS
Operating Systems: Linux, Kali Linux, Windows
Tools: Autopsy, Azure, Burp Suite, Metasploit, Meterpreter, Nessus, Powershell, Snort, Splunk, Wireshark
_________________________________________________________________________________________________________________________________________________
CERTIFICATIONS
CompTIA Security+ (in progress)
Splunk Certified Core User (in progress)
_________________________________________________________________________________________________________________________________________________
Securing Cloud Applications | BlueBoltBlog.xyz – no longer active
Summary: Built, secured, and protected a cloud application within a Microsoft Azure environment to host a private cyber blog. Cryptographic methods were implemented to create a self-signed SSL certificate in Azure’s Key Vault and bound to the web application. Web application was protected with Azure’s Front Door, custom-configured WAF rule sets and Security Center.
Role: Application and Web Developer, Security Analyst
Tools: Microsoft Azure (Keyvaults, App services, Front Door, WAF), Docker, HTML, OpenSSL, PHP
Offensive Security/Penetration Testing Capture the Flag | Rekall Penetration Test Report
Summary: Exploited vulnerabilities in a test organization’s web application, Linux and Windows servers using XSS, SQL injection, LFI and command injection, webshells and network pivoting. Generated a summary report with findings and mitigation recommendations.
Role: Penetration Tester
Tools: Burp Suite, Kali Linux, Metasploit, Meterpreter, Nessus, Nmap, Searchsploit, Zenmap
Building a Security Monitoring Environment | VSI Splunk Environment Report and Presentation
Summary: Designed a custom monitoring environment to protect a test organization’s systems and applications against simulated attacks. Designed custom alerts, reports and dashboard for Windows and Apache logs.
Role: SOC Analyst
Tools: Windows, Windows and Apache Servers, Splunk
_________________________________________________________________________________________________________________________________________________
EXPERIENCE
Sales and Marketing Representative – Aceso Interactive Inc. (June 2019-present) Boston, MA
$1.2 million in generated pipeline capital and annual operating dollars through lead qualification, sales conversion, and clientele relationship development
100+ prestigious health and hospital systems added to company sales pipeline
_________________________________________________________________________________________________________________________________________________
EDUCATION
Certificate in Cybersecurity – University of Denver (June – November 2022) Denver, CO
Bachelor of Science Degree in Biological Sciences - University of Denver (August 2017-June 2019) Denver, CO
You can also download my resume here