Mentors are highly qualified, experienced professionals who make themselves available in your local area to help you learn the course material and get certified. Each Mentor is hand-selected from students that have completed their relevant GIAC certification with scores of 85% or higher.
Alderson, Duncan
Duncan is a Senior Manager within PwC Australia's Cyber Security and Forensics practice. He has over 17 years experience in Offensive and Defensive Cyber Security roles and is the lead for the National Operational Technology Cyber Security capability and Perth Cyber Security team. He has worked in United Kingdom, Indonesia, Abu Dhabi, Singapore and Australia.
Duncan can truly provide the holistic view of Cyber Security as he has been on both red and blue teams and is the proud holder of the GXPN Exploit Researcher and Advanced Penetration Tester and the GMON Continuous Monitoring and Security Operations.
Arndt, James
James Arndt has been to numerous SANS training events and would like to share his knowledge gained with you. With his passion for security and years of classroom experience, you will gain practical knowledge and skills to take back to your company. James is a Security Engineer at the American Transmission Company based in the Milwaukee area. There he focuses on access management, vulnerability management, and reverse engineering whatever malware or malicious document comes his way. You might also find James hanging out with his family, playing guitar, or tinkering around in his basement lab.
Baker, Chris
Chris is a Director in IT Security at GlaxoSmithKline where he leads the services that deliver the IT controls that protect the company's network, servers, web and mobile applications, and data. He has led many incident response and vulnerability remediation efforts and has been working for over 20 years in the healthcare industry to promote information protection and IT security. He knows that striking the best balance between security and usability depends on having a clear understanding of the risks that vulnerabilities and threats pose to the business and being able to articulate those risks to senior business leaders. Chris earned his MBA from Drexel University with concentrations in both Management Information Systems and Corporate Finance and holds several professional and security certifications including GPEN, CISM, and a Six Sigma Black Belt.
Chris is an active member of the infosec community and looks for every opportunity to both learn and encourage others to gain a deeper understanding of the fascinating and often intimidating world of information security. He regularly takes part in security training, conferences such as Shmoocon and BSides, and capture-the-flag challenges to apply and grow his skills and understanding.
Barkley, Joey
Beltman, Brad
Bernal Michelena, David Eduardo
David Bernal Michelena holds a bachelor's degree in Computer Engineering from the National Autonomous University of Mexico (UNAM). Since June 2015 he serves as a cyber security researcher in Cyber Security Group in Scitum, a large consultant company in Mexico and Latin America. David's main activities are malware analysis, cyber threat intelligence, digital forensics and writing yara and snort rules to detect those threats and protect customers. David also performs ethical offensive activities and writes custom tools that are used in controlled environments to verify that security products do what they claim to do.
From July 2013 to June 2015 David was a member of Security Events team at Alstom, a large company in energy and transport solutions protecting the endpoint environment of about 90,000 hosts distributed worldwide. In his time in Alstom his main activities were incident response, malware analysis and remediation, forensic analysis, IPS/IDS and SIEM management.
Formerly he served as a Senior Computer Forensic Analyst at Scitum from July 2011 to July 2013. His main activities there were evidence acquisition, analysis, preservation, incident response, log analysis and results reporting to Scitum's customers. In Scitum he had the opportunity to work in challenging projects for Mexican private and public institutions, including large Banks and other large government clients.
From August 2009 to July 2011 he worked as a forensic analyst and incident handler in UNAM Computer Emergency Response Team, which is the first CERT to be created in Mexico. David is GXPN, GASF, GREM, GCFA, GCFE and Access Data certified. He likes programming in several languages and is a command line lover in LINUX and Windows as well.
On his free time, he likes to swim and play the piano.
Blidaru, Raluca
Boyles, Tim
Tim Boyles is the Security Administrator for a Dallas based security company. He brings over 19 years of experience in the IT field. He has worked for the U.S. Navy, a network consultancy, and various other industries, always involved in networking and security.
He has been involved in security architecture, regulatory compliance, intrusion detection, penetration testing, vulnerability assessments, web application security assessments, and uses many security tools over the course of his work.Capuano, Eric
Cox, Alexandre
Curtis, Michael
Michael A. Curtis (Mike) has over 20 years of experience in the security field and has held several key leadership positions at Rollins, Virtual IT Experts, this.com and BellSouth.net. Additionally, Mike is active in the security community having served as a past member of the Symantec Customer Advisory Board, and is an officer in the Atlanta (ISC)2 Chapter. Mike holds a BSEE, cum laude, from Northeastern University, an MBA from Bentley College and a CISSP.
Dinh, Cuong
Cuong Dinh is the Incident Response Lead at CH2M Hill, Inc. His expertise ranges from Vulnerability Management, Intrusion Detection and Analysis, Incident Response, Digital Forensic Analysis and Investigation, Malware Analysis, to Web Application and Network Penetration Testing. Cuong holds multiple GIAC certifications including: GSEC, GCIA, GCIH, GCFA, and GWAPT, along with a Bachelor's degree in Computer Information System from Metro State University of Denver and a Master's degree in Management Information System from University of Colorado Denver. Throughout his career Cuong has had the opportunity to implement many security programs and technologies including Encryption, User Awareness program, Vulnerability Management, IPS/IDS systems, Incident Response program, Malware Sandbox and Analysis, etc. Cuong enjoys sharing knowledge and giving back to the community.
Druin, Jeremy
Jeremy Druin works as an internal pen-tester, incident responder, and defect-remediation expert for a multi-national transportation logistics company. Other responsibilities include web vulnerability assessment operations, setting application and database security standards, creating developer training programs, and teaching developers how to architect, design and write secure applications. Additionally Jeremy develops the open-source Mutillidae 2.x training environment and consults on web-application security topics. As the Director of Education for the Kentuckiana ISSA chapter, Jeremy presents on web application pen-testing and remediation along with operating the "webpwnized" YouTube video channel. Jeremy has a Bachelor in Computer Science from Indiana University and is a GIAC-certified Network/Web Application Pen-Tester and Exploit Developer.
Galley, Craig
Craig Galley is an Information Technology Professional with accomplished work experience in the Security industry since 2001. He earned a Bachelor of Science degree in Information Science from the University of North Florida. Early in his career, he was responsible for deployment and management of network prevention controls for a private sector organization.
Craig's career focus shifted exclusively to application development with a desire to lead secure coding best practices while chaired on Information Security Steering committees and managing large development projects and teams.
Craig's certifications include GSEC, GISP, CISSP and CSSLP. In his current role as an Information Security Officer, Craig manages and directs an Information Security Program in the public sector. He is also active in Information Security groups, with volunteer experience as a Vice President.
George, Matthew
Matt got his start in the technology field by joining the US Army and serving as a satellite terminal operator for 5 years. Since the Army, he has worked as a firewall technical support technician, network engineer, systems administrator/engineer and a security analyst in the defense contracting world. He currently works as a security researcher doing threat analysis, threat hunting and penetration testing. He is passionate about using technology for good and educating technical and non-technical people about InfoSec issues.
Gifford, Charles
Charles Gifford (Chazz) is a recognized expert within cybersecurity and has been working in the information technology and security field since 1997. Over the course of his career, Chazz has held various technical and leadership positions within the Aerospace and Manufacturing Industry. Chazz currently manages a Global Security and Risk Team for a fortune 500 company that spans everything region. Chazz?s latest scholastic achievement is graduating with honors from the University of Maryland University College in the Masters of Science in Information Technology focused in Information Assurance. Chazz has specialized in mentoring, metrics and measuring effectiveness of security teams throughout the last 7 years of experience.
Hansen, Edward
Helin, Matt
Janzen, Cliff
From load FILENAME,8,1...to the Start button... to touch interfaces, technology has been a constant companion (and sometimes obsession) for Cliff.
Cliff's professional career started 18+ years ago as a help desk analyst supporting mainframes and dial-up internet. He progressed through desktop support, desktop management and server administration and joined the security team in late 2008. The wide diversity of topics in security has Cliff thirsting for knowledge like he was a teenager again.
Cliff currently holds CISSP, CISM, GPEN, GCIH, GWAPT, GXPN, OSCP, MCSA and Security+ certifications.
Occasionally (read rarely), Cliff will add something mildly informative to somethingsomethingsecurity.com.
Jeanmougin, Mark
Kelly, Shawn
Khan, Azeem
As an information security professional, Azeem has accrued years of experience in security engineering, incident response, digital forensics and vulnerability management. A firm believer in ongoing education, he works hard to keep his base of knowledge current and up to date. Although he holds accreditations from such industry leaders as GIAC, ISC2 and Access Data already, he is constantly looking for ways to learn more and to gain a better understanding of his field, attending and volunteering at conferences such as Shmoocon and Blackhat.
Azeem is a natural people person who connects easily with people from all backgrounds. He enjoys working with and mentoring people who are motivated to the same extent that he is, and he takes real pleasure in discussing the security field. A strong advocate for continued progress in the security field, he speaks eloquently and listens closely, knowing that there is always something for him to learn and share.
Azeem looks forward to serving as a mentor as a way to provide value to the community that has become so much like home to him over the years.
Koziar, Kory
LeVeque, Vincent
Vincent LeVeque is a Business Information Security Officer for American International Group (AIG), a global financial services company. Vincent teaches information security classes for UCLA Extension. He is the author of the book, Information Security: A Strategic Approach, published by IEEE/Wiley. Vincent received his Masters of Science degree in computer science specializing in information security from James Madison University, one of the first programs certified as an NSA Center of Academic Excellence in information security.
Lock, Nathanael
Luongo, Roy
Roy Luongo is a cyber professional with over 15 years experience. As a CNO operator, Roy has performed offensive cyber operations and adversary emulation for the federal government for many years. He served as a technical director for interactive operations and the Chief, NSA Red Team. As a SME for the United States Army and the Department of Defense(DOD) he has developed thousands of cyber professionals through direct training and workforce design used throughout the DOD and other Federal organizations. Mr. Luongo holds two Masters Degrees in Information Management and Cyber Security Additionally, he holds CISSP, GCIH, GPEN, GXPN, GAWN, and GMOB certifications. He has worked with local high schools to mentor teams to the final rounds of both the Cyber Patriot and Maryland Cyber Competitions and is an avid promoter of cyber skills in middle and high school curriculums. Mr. Luongo has also served as a member of the Center of Academic Excellence, Cyber for the Department of Defense, working with Universities and Colleges to expend curriculums and degree programs in Cyber Security and Cyber Defense. Roy enjoys working with like-minded individuals and mentoring for the SANS Institute, allows him to experience the growth of cyber in a small group collaborative setting. Mentorship allows him to give back to a community that has given him so much.
May, Kenneth
McAninch, Bryan
Nguyen, Hai
Hai Nguyen started his career in Information Technology in 1996. He has held various job roles in Information Technology from End User Support Lead, Infrastructure Engineering Lead, Software Developer Lead, and Security Analyst Lead.
Hai is extremely self-motivated and self-taught. He enjoys taking apart new technology from software to hardware just to learn how to put them back together. When he is not taking things apart, he is constantly writing code or reading about new technology.
Hai holds multiple SANS certification including GSEC, GCIA and GCIH. He got involve in providing security awareness training in 2014 and is currently working towards becoming a security instructor. He is very excited about being a mentor with SANS as it covers a broad range of disciplines in Information Technology which he is very experience in.
Nickola, Jason
Peterson, Lisa
Lisa Peterson CISA, CRISC, CISSP has worked in Information Security for 20 years, and is a Security Analyst for Progressive Insurance. Her current focus is in governance, risk and compliance. She is a part-time instructor at Cleveland State University and also speaks on security topics. She serves on the board for the Information Security Summit, the Northeast Ohio chapter of ISACA, and the Northeast Ohio chapter of CSA.
Poole, Brandon
Brandon C. Poole is SOC analyst for an electric & gas utility company in the southeastern US. He brings with him 10 years of IT experience in system administration, network administration, disaster recovery, and information security. During this time Brandon has helped various employers setup & run vulnerability assessment/management, business continuity, security assessments, and change management programs across nonprofit, government & private sector organizations.
In addition to the above experience he also maintains numerous professional creditable such as GSEC, GCWN, GCIH, GCCC, CEH, CompTIA Security +, CompTIA Network + and IBM QRadar SIEM Analyst as well as being a member of ISSA, InfraGard, and the GIAC Advisory Board.
When Brandon isn't at work he can be found further sharpening his skills in his homelab, writing Python or PowerShell scripts to automate security workflows, tweeting on Twitter (@bcpoole_sc), working on his new blog bitsbybrandon.com, or mentoring others in their IT and/or Infosec career.
Rozema, Drew
Scharringhausen, Louis
Seiler, Heather
Smith, Billy
Billy Smith is an IT Security professional with over 25 years of training in the IT and Security field. He began his career with Lockheed Martin Data Systems deploying networks, UNIX based network management systems and satellite communications for the Department of the Navy. Following Lockheed Billy joined Mercer Engineering Research as a Computer Scientist working on contracts with the Air Force maintaining enterprise level UNIX Systems. Later, as the center became known for its Finite Element and Computational Fluid Dynamics analysis Billy deployed and managed High Performance Linux Clusters to run solvers for these difficult problems. For the past several years Billy has served as the centers Sr. Division Manager of Network Systems and Information Assurance which has included the development and ongoing management of a Network Security Operations Center. Billy currently holds the following security certifications (GSEC, ACSA and ACSE)
Sokolovskiy, Dmitriy
Stone, Scott
Scott has been in the IT industry since 1970 and a has been a member of the IEEE since 1984
He has multiple College degrees, including:
Masters of Science in Computer Engineering, University of South Florida
Masters in Business Administration, University of Tampa
Many vendor certifications, including:
MCSE, Master CNE, CISSP and GSEC certifications.
A Veteran of the USAF, 56th Security Police Squadron in Tampa Florida.
Scott is excited to mentor the GSEC class once again because it was a lot of fun last time. All of the people who took the class passed and were certified, he wants to see that happen again.
Charter member of the ISC2 Twin Cities Chapter, Board of Directors, Treasurer.
Participate in UMSA, and putting on Secure 360 conference.
Scott is a Scouter (BSA) with two sons and a daughter who are Scouts. And a long term volunteer in scouting (12 years) currently the Metro Lakes District, District Commissioner in the Northern Star Council.
Taylor, Austin
Austin Taylor has an extensive background in Defensive and Offensive Cyber Operations and has performed incident response for some of the world's top Fortune companies. His expertise includes penetration testing, data science, threat hunting and User and Entity Behavioral Analytics (UEBA). He is the co-author to "Crash Course in Data Science for Hackers" which is taught annually at Blackhat and author of "How to Build a World Class Monitoring System for Home, Small Office, or Enterprise Networks". In his off time, he teaches programming and conducts training at conferences. He currently serves as a Cyber Warfare Operator for the United States Air Force and works at IronNet Cybersecurity as a Senior Security Researcher. Austin holds multiple industry certifications including CISSP, GMON, GCCC, GCIA, GCIH, GCPM, GSEC, GPEN, CEH, VCP, CCNA:Security
Thompson, Andy
Voorhees, James
Jim Voorhees was named MSISM Program Director of SANS Technology Institute (STI) in November 2011. A graduate of STI, Dr. Voorhees has had a varied career in government and private industry. He earned his Ph.D from the Johns Hopkins School for Advanced International Studies after earning degrees in International Affairs from the George Washington University and working on the editorial staff of the International Food Policy Research Institute. After writing a book for the Kettering Foundation (Dialogue Sustained) and experience with Kettering, the Congressional Research Service, and IREX, Dr. Voorhees entered the IT industry as a technical writer, he quickly moved on to systems administration, then IT security and SANS. He has worked on security at several government agencies, including the FBI and the IRS, and currently works for Sage Management as a Network Security Engineer on a DOD contract.
Willis, Brian
Brian Willis is a cyber-security expert for CSRA based in the DC area. He has been providing Unix/Linux administration and cyber roles to private industry and government for 18 years. Currently his role is running cyber systems that protect the federal government. Before that he managed systems at NOAA's National Weather Service in various operational roles. Through his years of experience he helped draft security guidance for interagency communication via disparate application stacks using application layer security proxy devices. Other projects include NIST/FISMA security, security scanning, PKI key creation, network packet dumps, etc. He enjoys understanding how things interconnected and then evaluating how they are vulnerable or prone to failure. All this interest started with Amateur Radio and has led to a passion for all thing technical and mechanical. He holds the CISSP, GCUX, and CCSK.
