4 Days Left to Save $200 on SANS 2016

Mentor: Bios

Mentors are highly qualified, experienced professionals who make themselves available in your local area to help you learn the course material and get certified. Each Mentor is hand-selected from students that have completed their relevant GIAC certification with scores of 85% or higher.

Ali, Ahmed

Ahmed Ali is currently the Head of Technical Department at Contego Solutions where he consults for clients on Information Security, Incident Response and Digital Forensic requirements. Ahmed is certified in different technical qualifications which include MCP, MCSA, MCSE, CCNA, CCNP, ACE, EnCE, GCIH, GCFE, GCFA . Ahmed has over fourteen years of experience in Information Security, Incident Response and Digital Forensic Solutions Design, and Deployment. With his extensive knowledge in Digital Forensics, he has consulted for enterprises, government and law enforcement agencies on designing secure digital forensic labs with the latest digital forensics solutions. Ahmed is specialized in Digital Forensics Laboratories Design, Digital Investigation Systems, Computer Forensics Systems, Mobile Forensics Systems, Network and Media Forensics Systems, Incident Handling and Response. He has also trained commercial and government agencies on IT Security and digital Forensics acquisitions and analysis. Besides consulting and advising clients across the GCC, Ahmed previously worked at First Information Security and Etisalat.

Arndt, James

James Arndt has been to numerous SANS training events and would like to share his knowledge gained with you. With his passion for security and years of classroom experience, you will gain practical knowledge and skills to take back to your company. James is a Security Engineer at the American Transmission Company based in the Milwaukee area. There he focuses on access management, vulnerability management, and reverse engineering whatever malware or malicious document comes his way. You might also find James hanging out with his family, playing guitar, or tinkering around in his basement lab.

Beatty, James

James has been involved in technology since the mid 80s, and has provided security leadership over the past decade in a variety of environments from education to health care and retail, from medium to large enterprise.

Borso, Serge

Serge Borso is the owner and principal consultant of SpyderSec and a SANS Community Instructor. He is an active member in the information security community and has consulted with dozens of organizations to improve their security posture. He has previously developed enterprise vulnerability management programs, created security awareness training solutions and worked to implement a transparent biometric security system for over one million unique online banking users to help combat fraudulent transactions. Currently Serge leads penetration testing engagements and is responsible for the vision, strategy and product/service offerings of SpyderSec.

Serge has lead a number of private training events and presents regularly at public speaking engagements; with the SANS Institute he teaches SEC542: Web Application Penetration Testing and Ethical Hacking. Serge earned his Master's Degree in Computer Systems Security from Colorado Technical University and holds several security certifications including: CISSP, GPEN, GCFA and GWAPT.


Bougere, Daniel

Dan Bougere has over 15 years of experience in the information technology field. Currently, he is the Director of Incident Response Services for Soteria, LLC. His prior experience includes being a Global Network Exploitation and Vulnerability Analyst at the NSA and an Intrusion Detection Analyst on contract to the High Performance Computer Modernization Office's DREN/SDREN network. Dan holds a B.S. in Software Engineering Technology from the University of Southern Mississippi, an M.S. in Information Assurance from Capitol College, and an M.S. in Technology Studies from Eastern Michigan University. He also holds the CISSP, GCIH, GCIA, GSEC, GXPN, GNFA and multiple other industry certifications. Dan enjoys being a geek, and loves spending time with fellow like-minded individuals. He has done various informal and formalized training sessions, and takes pride in making sure that he keeps his students/attendees interested and involved in the subject matter. There are aspects of computer security that can be exciting for anyone, and he makes sure that carries over to his training.


Burton, Gene

Gene Kelly Burton is a Senior Network Architect with†over 20†years experience in the IT industry working for various companies†providing Enterprise Networking and Security solutions for a variety of customers

Kelly began his career with the Federal government after obtaining an Electrical Engineering degree from Old Dominion University in 1989. Kelly was trained by the government as a Nuclear Engineer and then began working in IT in 1994. Kelly started in IT as a Field Service engineer, repairing and troubleshooting desktop PCs and worked his way up to Network Administrator and eventually to the lead of Network Security for one of the four Navy Shipyards. Along the way, Kelly obtained several professional certifications: Certified Novell Engineer (CNE), Microsoft Certified Systems Engineer (MCSE), Cisco Certified Networking Professional (CCNP), GIAC Security Essentials Certification - Gold (GSEC) and the Certified Information Systems Security Professional (CISSP).

Most recently, Kelly obtained the Project Management Professional (PMP) certification. After working for the government for 18 years, Kelly became a private consultant. Kelly is currently working for HP as a project manager overseeing a wide variety of projects that cover networking, storage and data center consulting.

Kelly is excited about becoming a mentor as it allows him to become a part of the SANS community which has helped so many develop and increase their security knowledge. Kelly's first SANS conference was in 2002 and it was the best training conference he has ever attended. Kelly obtained the GSEC - Gold certification in 2003 and has worked diligently to maintain it ever since. Kelly is excited about mentoring the GSEC course as it provides a foundation of security knowledge for IT professionals looking for the latest information on securing systems and organizations.

Clausing, Jim

Jim Clausing has over 25 years experience in the IT field including systems and database administration and security. Jim has done research in parallel processing and distributed systems. For the past 10+ years, he has concentrated on many aspects of security including system hardening, intrusion detection, firewalls, incident response and forensics. His current focus is in malware analysis and penetration testing. Jim holds the GIAC GCFA and GCIA Gold certifications (serving on the advisory boards for each, the former as chair before they were combined into a single board). He also holds the GIAC GCIH, GCFW, GSIP, and GSOC Silver certifications and the GREM and SSP-MPA certificates, as well as the CISSP. Jim is a Community SANS and SANS Stay Sharp instructor. He was a co-author of the 2003 SANS Press book, Securing Solaris 8 & 9 Using the Center for Internet Security Benchmark, and is a volunteer incident handler at the SANS Internet Storm Center (isc.sans.org). Jim also enjoys cycling and is an instrument-rated private pilot.

Coursey, David
Curtis, Michael

Michael A. Curtis (Mike) has over 20 years of experience in the security field and has held several key leadership positions at Rollins, Virtual IT Experts, this.com and BellSouth.net. Additionally, Mike is active in the security community having served as a past member of the Symantec Customer Advisory Board, and is an officer in the Atlanta (ISC)2 Chapter. Mike holds a BSEE, cum laude, from Northeastern University, an MBA from Bentley College and a CISSP.

Drews, Melvin

Coming from a long background of designing, implementing and supporting enterprise IT systems, Mel Drews found himself working in information security rather by accident 10 years ago and found a passion there. His security-focused experience includes security curriculum development, penetration testing, vulnerability and risk assessment, program development, audit, and miscellaneous consulting for U.S. and international entities, primarily in government, financial services and energy sectors. Mr. Drews currently works with a global financial services firm with responsibility for software security. He holds the GCFE, CISSP, CISA and Project+ certifications.

LinkedIn: http://www.linkedin.com/in/meldrews

Blog: http://www.redcedarnet.com

Elovitz, Steven

Steve Elovitz is currently a Manager within Mandiant's security consulting team. Mr. Elovitz has a broad range of experience in the industry and has delivered both proactive and reactive services to government and commercial clients. Steve has significant experience in IR, forensics, as well as penetration testing. Steve graduated from Pennsylvania State University with a BS in Information Science and holds multiple certifications including: GREM, EnCE, CEH, and CISSP. Throughout his career, Steve has gained experience as a sysadmin, a developer, and as both a red team and blue team analyst.†

Fitzl, Csaba

Csaba graduated in 2006 as an IT engineer at the Budapest University†of Technology. For 2 years he worked with Cisco product support at†Getronics then in 2008 he was hired by ExxonMobil where he contributed†to designing global networks and provided support for 4 years. In the†last 3 years he has focused on detecting and preventing security†intrusions, specialising in network forensics and malware analysis. He†currently holds OSWP, OSCP, OSCE, OSEE, GREM, CEH, ECSA, CHFI, CCNP,†CCDP, CCNP Security certifications. He is a regular workshop presenter†at the Hacktivity conference in Hungary. Blog:†theevilbit.blogspot.com
Other Achievements: 4th place on the 2013 DC3 Forensics†Challenge, won†SANS Netwars at SANS Secure Europe 2014, SANS Lethal forensicator coin†holder.

Gamble, Timothy

From physical layer and systems integration to network engineering and information security, Tim has gained diverse knowledge by being a constant in the IT industry for over 15 years. Currently employed as a Senior Security Analyst for a global manufacturing company, Tim gets in front of SIEM, NAC, and firewall technologies daily, along with incident response and vulnerability assessments as a SOC team member. His approach to helping others is to provide a strong understanding of the material and show how it applies in the real world. Tim has a degree from Ohio University and his certifications include SANS certified GCIH and GICSP, Cisco CCNP, CCDA, and CCNA-Security, and also ISC2 CISSP.

Gorenflo, Jonathan

Jon has worked in Information Technology for over 10 years, and has focused on Information Security for the last 7 years. He is passionate about security, and loves trying to ignite that passion in other people. Jon was a Warrant Officer in the Army Reserve, where he served for over 11 years. He currently maintains the GCIH, CISSP,MCSE: Security and Security+.

Hadder, Allen

Allen Hadder has been in the IT field for over 20 years. Most of his 20 years of experience has been as a consultant for small to enterprise businesses in the financial, retail, and education industries.

Allen currently holds the GIAC GSEC and GCIH certification. In past years he has also earned his MCSE, Cisco CNA, Citrix CEA, and VMware VCP.

He also has a passion for teaching and educating people about information security.


Harris, Mike

Mike Harris is an Information Technology Cyber Security Professional holding certifications as a Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Information Security Professional (GISP), Cisco Certified Network Associate Security (CCNA-Security), Cisco Certified Network Associate (CCNA), Red Hat Certified Technician (RHCT), and Red Hat Certified Systems Administrator (RHCSA). Mike has additional technical certifications which include Digital Forensics Examiner, Network Protocol Analyst, Project+, Linux+, and A+. Mike will soon graduate with a Bachelor of Science in Information Technology Security. Mike is the founder and former board member of TinkerMill, a non-profit organization dedicated to furthering the knowledge of our kids, adults, businesses, and municipalities in the use of high tech with the incorporation of creativity and art. He is also a Red Team Member of the Rocky Mountain Regional Collegiate Cyber Defense Competition. Mike has built a CSIRT from the ground-up, including a secure infrastructure using Linux systems (Red Hat and Ubuntu). Mike has extensive knowledge as a Technology Security Auditor conducting assessments, measuring vulnerabilities, security posture on internal and external networks, and account activities for insider threats and abuse.

Hubbard, John

With a degree in Electrical Engineering from Purdue University, John began his professional career in 2008 in the Engineering Leadership Development Program at BAE Systems. While working as an engineer, John pursued a graduate education from SUNY Binghamton, finishing in 2013 with a Masters degree in Computer Engineering specializing in Network Security and Information Assurance.

Since earning his master's degree, John works as a Cyber Security Analyst on the Advanced Threat Defense team at GlaxoSmithKline. His responsibilities include defending against targeted attacks, performing incident response, forensics, and malware reverse-engineering. Recently, he attended the SANS FOR610 Reverse-Engineering Malware and SEC560 Network Penetration Testing & Ethical Hacking courses, and earned the corresponding GREM and GPEN certifications. Additionally, John authored a paper published by IEEE on Android and iOS application security, which he presented at the 2014 IEEE Consumer & Networking Conference.

John is a regular attendee of BlackHat and DEFCON, and in his free time studies malware samples, runs a honeypot network, and enjoys slowly turning his home into a data center. He is passionate about information security, loves learning, and is enthusiastic about helping others succeed in their studies. John maintains a web presence with his blog at 909research.com and on twitter @jhub908, where he writes on malware, spam, threat analysis, and his growing virtualization lab.


Krishnan, Ramesh
Lawton, Timothy

Tim Lawton is an Information Security professional with over twelve years of experience in the IT industry. In those twelve years, his focus has been on network/system security and as worked in both the financial and retail industry. He currently is the Information Security Officer for his organization. He currently holds the GSEC certification and is part of the GSEC Advisory Board. In addition to his GSEC, he holds various √¬Vendor-Specific√¬ certifications as well.

Lemon, Joshua

Josh Lemon is the Cyber Security Incident Response Team Manager for the Commonwealth Bank of Australia and manages one of the largest dedicated incident response teams in the commercial sector in Australia. Josh has over 10 years of experience in the cyber security industry and has previously worked as a managing consult for BAE Systems Applied Intelligence where he managed all technical cyber security services for the Asia Pacific region and oversaw large and complex incident response engagements.
Josh has provided incident response, digital forensics and penetration testing services to Government, Law Enforcement, and the Commercial sector. He is also one of the co-organisers for SecTalks in Sydney, a monthly information security community event dedicated to presenting and teaching technical information security skills to others.
Josh has a varied background in the cyber security industry ranging from; Project Management, Lead Incident Responder, Forensics Analysis, Reverse Engineer, Penetration Testing, Secure Network Design, and Software Development. He currently holds a GCFA, GNFA, GCHI, GPEN and CCNA certification and also guest lectures on Digital Forensics at Universities in Sydney, Australia.


LeVeque, Vincent

Vincent LeVeque is a Business Information Security Officer for American International Group (AIG), a global financial services company. Vincent teaches information security classes for UCLA Extension. He is the author of the book, Information Security: A Strategic Approach, published by IEEE/Wiley. Vincent received his Masters of Science degree in computer science specializing in information security from James Madison University, one of the first programs certified as an NSA Center of Academic Excellence in information security.

Little, Iain
12 months as a Cyber Security Analyst / Team Lead with the ADF CIRT. 14 years as a systems/network administrator and team leader in the ADF.
Martin, Matthew

Matthew is currently the

manager of Infrastructure Vulnerability Identification at a Fortune 100 financial services institution. In his role, his team is responsible for rating and scanning for vulnerabilities. In previous roles, Mr. Martin has been responsible for building and running a security metrics program, leading a standards and policy redesign, served as a liaison to internal audit, and was a data in motion and data in use subject matter expert.

Matthew has an MS in International Economics from Valparaiso University and attended MBA school at UNC-Charlotte; as well as completed a certificate course at Harvard University in Leadership Communications. He currently holds the GSLC certification. Find Matthew on LinkedIn at www.linkedin.com/in/mattmartin and follow him on Twitter @MattMartinGFT and also at www.betterinfosec.com

McKenzie, Timothy

Timothy McKenzie has almost 20 years of IT and Information Security experience working in financial, government, defense contractor, and service related markets. Timothy has been trained in malware research and exploit development, expert penetration, and forensics work. Timothy works for Dell SecureWorks as a red team penetration tester, focused primarily on network and web-based attacks. Timothy loves sharing the vast knowledge he has acquired to give back to the Information Security community.


McNamara, Philip

Philip McNamara is an Information Technology veteran with 20 years experience. He started back when PC networks were new, Token Ring was something special, and PIX Firewalls booted from a floppy disk. Over the years Mr. McNamara has transitioned from Network Engineering, through Enterprise Operations to his current role in Enterprise Network Security. Though his efforts have primarily been in the Health Care market, security and incident response have always been a responsibility. As a SANs mentor, Philip would like to build on that experience and be able to share it with others.

Neely, Lee

Lee Neely is a senior IT and security professional at Lawrence Livermore National Laboratory (LLNL) with over 25 years of experience. He has been involved in many aspects of IT from system integration and quality testing to system and security architecture since 1986. He has had extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. Lee has worked with securing information systems since he installed his first firewall in 1989. As part of his employers Cyber Security Program (CSP) he leads their new technology group, working with programs to develop secure implementations of new technology. Lee was instrumental in developing their secure configurations, risk assessments and policy updates required for iOS, Android, BlackBerry and Windows Mobile Devices. He has worked to evolve solutions for both corporate and BYOD requirements. Lee worked with the SANS SCORE project to develop the iOS Step-by-Step configuration guide as well as the Mobile Device Configuration Checklist which is included in the SEC 575 course. He teaches cyber security courses, including the new manager cyber security training, and Information System Security Officer training. Lee has a Bachelors in Computer Science from Cal State Hayward and holds several security certifications including GMOB, CISSP, CISA, CISM and CRISC. He is also the Technology Director for the ISC2 EastBay Chapter.

You can keep up with Lee @lelandneely


Neise, Patrick

Patrick Neise is currently a Security Systems Engineer at Johns Hopkins Applied Physics Laboratory in Laurel, MD. Recently retired from the U.S. Navy, Patrick brings 20 years of operational experience in submarines and information warfare to the information security community. He holds a Masters Degree in Information Technology Management from Webster University, a B.S for the the University of Texas at Austin in Electrical Engineering and is currently pursuing a M.S. in Information Security Engineering from the SANS Technical Institute. Patrick holds multiple certifications including CISSP, CAP, GPEN, GCIH, GCIA, GCED, GPPW, GSLC, GSEC, GCCC, GWAPT, C|EH, and PMP. He is also a member of the SANS/GIAC and GPWN advisory boards.


Palmer, Jonathan
Jonathan Palmer has been working in information security since 2011. He graduated from the University of South Florida with a Bachelor's in Computer Engineering and a Master's in Computer Science. He currently holds two certifications: SSCP and GCIH. He is also a principle engineer for the MITRE STEM Capture the Flag (http://mitrecyberacademy.org/competitions/) and is excited to share knowledge with others passionate about information security.
Panico, Agostino

Agostino is an IT SEC enthusiast,†always looking to learn more, and putting†into practice what he learns. He has been†enjoying IT since 1991 when he was 5 years old, with his first love: Commodore 64. Agostino has been pentesting professionally since 2007. He†holds†a Master Degree in Computer Science, and he is a candidate for a†PhD in Incident Handling and Penetration Testing. Agostino is excited to be mentoring for SANS because it provides an opportunity develop a one-on-one relationship with the students as they learn the material and how it applies to their environment.

Parks, Jacob
Jake is an 18 year veteran of the IT industry. He currently serves as a Security Analyst at Insperity in Kingwood, Texas. During the course of his career, he has held positions such as Sr. Systems Engineer and Virtualization Architect allowing him the opportunity to develop in-depth knowledge of several enterprise technologies. He appreciates the value of continuing education and holds a number of industry certifications including the GSEC, VCP-DCV, VCAP-DCA, VCAP-DCD, EMCISA, CCP-N, CCA, MCTS, MCIPT, MCP, Security+, Network+, and A+ Jake is excited about the SANS community and the valuable skills they bring to the world of information security. He is eager to work with like-minded people and share his passion for technology. Twitter: @jakeparks LinkedIn: https://www.linkedin.com/in/jakeparks Blog: http://www.drakefire.com
Pereira Marques, Leandro Jordino
Experienced security consultant/specialist with 10+ years dealing with critical customers worldwide. Self-motivated and results-oriented professional. Areas of expertise includes, but are not limited to: - Forensics / Incident Handling (malwares, DoS, APTs, etc) - Intrusion Analysis (packet analysis, signature development) - Experienced with detection/protection technologies (multi-vendor): - NIPS/HIPS, NBA, SIEM, Antispam, Vulnerability Scanning/management, antivirus, firewall, web filtering, etc) - Malware research/analysis - Threat Correlation / Intelligence - Program Development (security awareness, DLP, audits) Extensive experience in implementation of leading market solutions for large companies, government agencies, law enforcement and military agencies. Teaching experience as former McAfee instructor, talking about forensics, malware analysis, incident response and multiple security solutions.
Peterson, Brandon
Brandon Peterson leads the Desert Research Institutes Cyber Security and Incident Response team. A native Nevadan and graduate of the University of Nevada, Reno, Brandon has spent the last 16 years managing IT infrastructure and security for banking, media, higher education and research. A winner of the SANS Ninja coin contest for Network Penetration Testing and Ethical Hacking, Brandon is a proven expert in cyber security. In addition to his GIAC-GPEN certification, Brandon holds the GIAC-GCIH certification from SANS and the Certified Information Systems Security Professional (CISSP) certification from (ISC). Brandon is committed to excellence and improving Nevadas cyber security posture through collaboration, training, and research.
Petsche, Don

Don has worked in information technology for over 20 years holding certifications including CNE and MCSE. He is GSEC certified and anxious to assist anyone looking to further their knowledge of security essentials. Don has worked in the fInancial industry, followed by a brief period in retail, then spent a little over a year working with the founders of a very well known Independent Consultants Exchange. While independently contracting, Don has worked in multiple states on government identity and health related projects. Don now works as a technology specialist leading a small team of government infrastructure specialists. He holds the title of Chief Information Security Officer at a state health department among other duties as assigned. In addition to his work at the state department, Don works part time with a team of dedicated enterprise security professionals managing SIEM deployment.

Robinson, Christopher

Chris Robinson graduated from the United States Naval Academy with a B.S. in Computer Science and served over 6 years in the United States Navy. †He then began his IT security career as a consultant for Booz Allen Hamilton.† Chris then attended graduate school full time at San Diego State University earning a M.S. in Computer Science.† Following graduation, Chris worked as Computer Scientist for the Navy and was an Adjunct Professor at San Diego?s Mesa Community College.

Chris then transitioned into ICS security and is currently a Senior Security Consultant for Cimation in Houston, TX where he regularly works on ICS cybersecurity projects in the Oil and Gas Industry.† Chris has learned first-hand the unique requirements and operational constraints for securing ICS environments.† Chris has obtained the CISSP and GICSP certifications and attended several SANS and industry conferences, although the SANS conferences are always the best.

LinkedIn Profile: http://www.linkedin.com/in/chrisrobinson98/

Romero, Steven

Steven Romero is a 20-year technical professional with experience in IT operations, ICS engineering, project management, & training. Steven is passionate about information security, and is a strong advocate and beneficiary† of the SANS hands-on approach to learning. Please join Steve and thousands of other InfoSec professionals who have advanced their knowledge and career through the SANS training and certification program.

Samuel, Erich
Erich has worked in the IT industry for 15 years and of those dealt with information security for 11 years. He has worked for companies ranging in size from small to large, and currently works for a global insurance company dealing with information security issues. Having dealt with the spectrum of work from policy to compliance to technical he has earned several certifications including GCWN, GSEC, CISSP, CISA, CEH, Security+ and others.

Erich has been involved in starting and running security user groups, and enjoys the challenges that come from such situations, and see's the SANS courses as a great way for people and learn and is committed to helping with that.
Santos, Valter

Valter Santos is a threat intelligence researcher at AnubisNetworks. He has more than 15 years of experience in forensic analysis, malware analysis, incident response and penetration testing. Valter likes to attack live malware in the morning, kill it and autopsy it by noon. He holds the GCFA, GCIA, GCIH and GSEC certifications.

Scheidel, Greg

Greg Scheidel has over 20 years of hands-on experience in IT including desktop and server support, network design and implementation, application development and programming, IT service management, IT security, and information assurance. He currently leads the security branch of a large program responsible for providing security engineering, Assessment and Authorization (A&A) support and assessment activities, and general information assurance and security advice and recommendations. Greg excels at communicating with technical and non-technical stakeholders, firmly believes IT and security must serve business needs rather than exist for their own sake, and is passionate about teaching others while reinforcing and honing his own knowledge.

Thomas, Sean

Sean Thomas has over 20 years of Information Technology experience in Higher Education during which he has been involved in various aspects of IT including desktop support, networking, academic systems administration, and Windows & Unix/Linux server administration.† For the past several years, Sean has been focused on IT Security and is currently a Senior Information Security Analyst with the world's largest, fully accredited university specializing in aviation and aerospace. He was an integral part of the development of the Security Services team at the University.† As part of this team, he has led initiatives in support of academic research, student services, and policy development.† He has experience with IDS/IPS, firewalls, packet analysis, vulnerability scanning, forensic analysis, and security assessments.† Sean is also part of the SANS OnDemand QC team.† Sean has a Bachelor of Business Administration in E-Business Technology, has held MCP and RHCT certifications, and currently holds several GIAC certifications including GCED, GCFA, and GCIH.


Twombley, Keith
Vedaa, Charles

Charlie Vedaa has more than a decade of security operations and engineering experience. He holds several GIAC certifications, including the prestigious GSE. Charlie has a background in network engineering and has been a CCIE since 2001. He's also presented at top security conferences, including DEF CON, Summercon, and HOPE.


Voorhees, James

Jim Voorhees was named MSISM Program Director of SANS Technology Institute (STI) in November 2011. A graduate of STI, Dr. Voorhees has had a varied career in government and private industry. He earned his Ph.D from the Johns Hopkins School for Advanced International Studies after earning degrees in International Affairs from the George Washington University and working on the editorial staff of the International Food Policy Research Institute. After writing a book for the Kettering Foundation (Dialogue Sustained) and experience with Kettering, the Congressional Research Service, and IREX, Dr. Voorhees entered the IT industry as a technical writer, he quickly moved on to systems administration, then IT security and SANS. He has worked on security at several government agencies, including the FBI and the IRS, and currently works for Sage Management as a Network Security Engineer on a DOD contract.