Resume

BRIAN OBERLIES

Denver, CO 80238 | 1.603.851.0996 | boberlies21@gmail.com

https://www.linkedin.com/in/brian-oberlies-a84493110/

___________________________________________________________________________________________________________________________________________

Security Analyst

Linux and Windows Operating Systems | Mitigate System Vulnerabilities | Networking | Research

Detail-oriented security analyst proficient in Linux and Windows operating systems, command line execution, scripting, network security, cryptography and SIEMs. Holds a certificate from University of Denver’s Cybersecurity Bootcamp and in the process of obtaining CompTIA Security+ certificate. An intuitive, forward-thinking problem solver who brings technical aptitude and an understanding of corporate business processes. Proven success in leveraging industry-standard tools such as the command terminal, Wireshark, Burp Suite, Metasploit, Meterpreter, and Splunk to identify system vulnerabilities and harden existing systems to prevent and mitigate future breaches. Technology and security enthusiast who is motivated by teamwork and innovation.

TECHNICAL SKILLS

Operating Systems: Linux, Kali Linux, Windows

Tools: Autopsy, Azure, Burp Suite, Metasploit, Meterpreter, Nessus, Powershell, Snort, Splunk, Wireshark

_________________________________________________________________________________________________________________________________________________


CERTIFICATIONS

CompTIA Security+ (in progress)

Splunk Certified Core User (in progress)

_________________________________________________________________________________________________________________________________________________


PROJECTS

Securing Cloud Applications | BlueBoltBlog.xyz – no longer active

  • Summary: Built, secured, and protected a cloud application within a Microsoft Azure environment to host a private cyber blog. Cryptographic methods were implemented to create a self-signed SSL certificate in Azure’s Key Vault and bound to the web application. Web application was protected with Azure’s Front Door, custom-configured WAF rule sets and Security Center.

  • Role: Application and Web Developer, Security Analyst

  • Tools: Microsoft Azure (Keyvaults, App services, Front Door, WAF), Docker, HTML, OpenSSL, PHP

Offensive Security/Penetration Testing Capture the Flag | Rekall Penetration Test Report

  • Summary: Exploited vulnerabilities in a test organization’s web application, Linux and Windows servers using XSS, SQL injection, LFI and command injection, webshells and network pivoting. Generated a summary report with findings and mitigation recommendations.

  • Role: Penetration Tester

  • Tools: Burp Suite, Kali Linux, Metasploit, Meterpreter, Nessus, Nmap, Searchsploit, Zenmap

Building a Security Monitoring Environment | VSI Splunk Environment Report and Presentation

  • Summary: Designed a custom monitoring environment to protect a test organization’s systems and applications against simulated attacks. Designed custom alerts, reports and dashboard for Windows and Apache logs.

  • Role: SOC Analyst

  • Tools: Windows, Windows and Apache Servers, Splunk

_________________________________________________________________________________________________________________________________________________


EXPERIENCE

Sales and Marketing Representative – Aceso Interactive Inc. (June 2019-present) Boston, MA

  • $1.2 million in generated pipeline capital and annual operating dollars through lead qualification, sales conversion, and clientele relationship development

  • 100+ prestigious health and hospital systems added to company sales pipeline

_________________________________________________________________________________________________________________________________________________


EDUCATION

Certificate in Cybersecurity – University of Denver (June – November 2022) Denver, CO

Bachelor of Science Degree in Biological Sciences - University of Denver (August 2017-June 2019) Denver, CO


You can also download my resume here