To Top
  • I am your Cybersecurity Specialist.
  • I am your creative security-oriented developer.
  • I am your diligent static code-reviewer.
  • I am your hard-working Security Engineer.
  • I am your out-of-the-box thinker.

zachARY MILLER 

Seasoned cybersecurity professional with 6 years of hands-on experience across the security domain.

About MeMy Experience

About ME

I am a seasoned cybersecurity professional with 6 years of hands-on experience across the security domain. Through my studies, I have become fluent in both Red team and Blue team methodologies, and I have specialized in vulnerability management, automation and system administration.

Driven

I am results-driven, aiming to solve the toughest cybersecurity problems before they become incidents.

Charismatic

I have a strong self-motivated work ethic and a great interest in research and in helping my colleagues become their very best.

Curious

Cybersecurity is my passion, and I do my best daily to teach myself new things away. I have an ear to the ground and proactively take steps to remediate vulnerabilities, eliminating unnecessary risk.

TECH STACK

My favourite EDR platform is CrowdStrike, which I use in conjunction with Splunk. The VMDR programs I'm most familiar with is Rapid7 and Qualys. In addition to Empire and Metasploit, I'm also well trained in leveraging Kali Linux when performing pentests.

My Experience

I've spent the better part of six years of my life engaged in the computer sector and have had a burning passion for cybersecurity since I was old enough to operate a keyboard. For me, it's more than a job; it's a reflection of my personality and a set of talents I'm happy to have acquired. Here are the sites where I've worked and demonstrated that knowledge.


Bugcrowd Logo
2022 - Current
Senior Security Engineer


• Established and refined the IR (Incident Response) plan for cybersecurity-related incidents, and setup automations to monitor all potential threats in and out of the environment.

• Created bespoke integrations and optimizations to serve as middleware in an otherwise serverless environment.

• Improved the SIEM to allow better enrichment of data and allow IR responders to have the information they need at a glance, allowing extremely fast and accurate response times.

• Assisted team with the creation of new projects and constant improvements of existing systems, allowing a stronger, more resilient overall baseline in a Unix/Linux based environment.

• Proactively utilized mass communication systems to address potential security problems before they become an incident. 

Herc Rentals Logo
2021-Current
Cybersecurity Analyst II


• Collaborated with departments on company-wide initiatives, and developed and implemented configuration hardening and optimization scripts, resulting in a 50% improvement in the DoD STIG score (95) and roughly $560K in cost savings across all workstations and PCs.

• Developed POC environments and logging for testing third-party vendor software prior to integrating it into infrastructure, lowering operational risk and saving the organization $40-160K by purchasing software that was more suited to our environment.

• Established and optimized middleware for apps and SaaS solutions that lacked pre-existing integrations, including on-demand scanning and patching using Qualys for over 5500 assets. This eliminated ticket creation and allowed instant feedback during patching.

• Organized a patch management program for internal and contract applications inside Rapid7, which included 88 distinct apps and 288 servers.



TTEC
2020-2021
TTEC - Banking Service Desk Associate


• Communicated clearly to customer inquiries about basic banking services and product solutions

• Triaged suspicious activity, reversing transactions, and reissuing compromised debit and credit cards

• Conducted cyber awareness training to customers

• Provided methods of self-assistance to help cardholders manage their accounts autonomously



Support.Com
2017-2020
Remote Services Engineer


• Handled ten clients per hour with Malware, Ransomware, and Escalation Remediation issues with a 100% success rate, ranking in the top 1% of customer satisfaction

• Out of 2000 personnel, remained in the top twenty for quality assurance compliance

• Maintained time-sensitive client success reports and studied additional strategies to boost customer happiness, such as generating self-help manuals and integrating and packaging open-source tools for non-technical end users.

• I trained and mentored new agents on the policies and procedures outlined in the business playbook for handling technical support calls which was authored by me.


Additional Skills

Vulnerability
Management

  • Qualys
  • Rapid7
  • Tenable Nessus Scanner
  • OpenVAS
  • Greenbone Vulnerability Scanner

Security
Information and
Event
Management

  • Splunk
  • Splunk Phantom
  • Splunk On Call (VictorOps)
  • Splunk Enterprise Security

Endpoint
Detection &
Response and
Zero Trust

  • Crowdstrike Falcon Realtime Response (RTR)
  • Cylance
  • CyberArk PAM

Firewall

  • iptables
  • ufw
  • PFSense
  • Falcon Firewall
  • Proofpoint Email Protection

Recon and
Discovery

  • nmap
  • WPScan
  • Burpsuite
  • OSINT
  • Shodan

Exploitation

  • Metasploit
  • Empire/Starkiller
  • Powersploit
  • ExploitDB/LOLBAS/GTFOBins
  • Pentera

Virtualization

  • VMWare
  • ESXi
  • vagrant
  • VirtualBox
  • qemu
  • proxmox

Programming

  • Bash
  • Python 2 & 3
  • Rust
  • Golang
  • PHP
  • PowerShell
  • C#

Cybersecurity By The Numbers

1862
Breaches YEARLY AVERAGE [GlobaL]
62%
Percentage of Unpatched vulnerabilities involved in data breaches
4620000
Average cost of a Breach (USD)
280
Average time in days for a business to realize they've been breached

"We should have never taught the sand to think."

STRENGTHS

My skillset is varied and multi-faceted. I pride my ability to improvise, adapt, and overcome any obstacle and make the impossible possible.

I've gained a great deal of knowledge regarding Vulnerability Management, Detection, and Response throughout the course of my experience working in the cyber industry. Most notably, I am quite proficient with the APIs provided by the VMDR systems Qualys and Rapid7, with which I have the most hands-on expertise. I am able to produce personalized solutions that are tailored to the specific needs of the environment in which I operate because of my extensive expertise and distinct brand of creativity.

Incident response is another aspect of my professional background. In today's cybersecurity environment, the capacity to detect and react to possible attacks is critical. More significantly, mechanisms must be in place to analyze, classify, and prioritize such warnings, as well as to automate the process to remove noise and keep things running smoothly. I have previous experience with Splunk Phantom and am capable of creating playbooks. I am also currently researching Datadog's Cloud Monitoring solution.

The development of automated systems is critical to the success of a company's operations. The same holds true for cybersecurity as well as for overall security. Automation provides for speedier analysis, as well as faster detection and response in the event that a host on your network is hacked.

The capacity to quickly and securely construct virtual environments for testing purposes is a key aspect when assessing new software for your regular deployment. A virtualization specialist like myself has had the opportunity to work with ESXi and proxmox as well as other virtualization software. This has empowered me with the skills to stand up Windows, Linux, and even Mac OS X virtual machines.  In addition to serving as a sandbox, a virtual environment may be utilized to detonate malware and generate Indicators of Compromise for use by your Incident Response systems.

The average time to patch a vulnerability is over 60 days and over 3/4 of cyber attacks in 2021 used vulnerabilities that were at least two years old. Many of these vulnerabilities can be patched and remediated through standardized patching, eliminating risk and in some cases even decreasing overall resource usage. I have helped develop these systems as well as reports for executives.

Cloud security is critical and is required for cybersecurity. Personally, I'm familiar with AWS and Azure, and I'm always eager to experiment with new technologies and systems.

Security is not just compliance for me, and involved in everything I do. I utilize the Secure SDLC style of development to ensure security is kept in mind throughout the life of the projects I work on.

VMDR
90%
Incident Response
85%
Server Automation
90%
Virtualization
75%
Patch Management
80%
Cloud Security
75%
Secure SDLC
80%
Azure Active Directory
85%

Contact

LET'S TALK

Tel: +1 (210) 634-3010

Fort Myers, Florida




Click Here to Schedule Time with Me