Summary
Overview
Work History
Education
Skills
Websites
Certification
Locations
Timeline
Generic

Jonathan Nissan

New York City,New York

Summary

Dynamic and detail-oriented Cybersecurity Architect with a Bachelor of Science in Computing Security from Rochester Institute of Technology, backed by a robust academic foundation in Business Administration. Expert in deploying innovative security solutions in high-stakes environments, including both government and private sectors. Proficient in a broad array of technologies including Linux distributions (Kali Linux, CentOS7, Ubuntu), Kubernetes via OpenShift, and extensive use of cybersecurity tools like NMAP and Metasploit. Demonstrates a strong track record of automating and enhancing security frameworks, which have significantly improved operational efficiencies and reduced risks. At IBM, led pivotal projects that streamlined threat modeling and vulnerability management processes, achieving a high adoption rate of developed tools and mitigations across product teams. Adept at leading teams, managing cross-functional projects, and delivering comprehensive security assessments and strategies that align with business objectives and compliance demands.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Cybersecurity Architect

IBM
01.2022 - Current

Issue Recommendation Engine(IRE)

  • Aided Security and Privacy by Design(SPbD) Team by automating their Security Issue Notice (SIN)
  • Implementation of security systems and architecture to enhance security posture to comply with internal security requirements
  • Designed architectural plans for new code, focusing on robust security and compliance with industry best practices
  • Automated application used to shorten time for creating issues and templates, added security features (Authentication and Authorization), Secured all internal endpoints, Modernized Template Production through Webhooks
  • Release Manager for new releases – Responsible for all work team does when a new version of a product gets released and for all technical and security mitigations
  • Streamlined issue creation process, saving 3,000 man hours monthly across 1,200 products
  • Achieved 99.8% adoption rate of IRE by product teams for creating issues
  • Developed comprehensive project documentation
  • Maintained strong communication with clients throughout the design process to ensure alignment between their vision and the final product
  • Threat Modeling Automation Project (Project Lead)
  • Developed tool that streamlined security and threat assessments for container-based products across Software Development Life Cycle, enhancing product team efficiency
  • Implemented automation for data gathering and populating threat and inventory spreadsheets, reducing manual data entry and improving data accuracy
  • Automated threat assessments, significantly reduce assessment time and increase chances of detecting vulnerabilities and threats at earlier stage
  • Elevated efficiency and accuracy of threat assessments, providing faster and more precise results to support decision-making and risk management
  • Provided automated mitigation guidance and outlined steps to evaluate relevance of detected threats
  • Integrated with IBM Secure Pipeline Services to establish a standardized practice for threat modeling
  • Containerized tool for enhanced scalability and deployment efficiency
  • Implemented and managed authorization features through AccessHub
  • Penetration Testing for DevIT
  • Collaborated with DevIT’s internal Penetration Testing teams to support two customer engagements, contributing to robust security testing efforts
  • Strategically identified system vulnerabilities and leveraged them to gain access
  • Employed various tools, including NMAP, GoBuster, Metasploit, John the Ripper, and Hashcat, to enhance security assessments
  • Prepared comprehensive reports detailing findings and recommended remediation strategies

• Supervised team of 6 interns, each assigned to different projects

• Authored multiple Technical Briefs, serving as internal documents that articulate the scope and capabilities of our team. These briefs are valuable resources for cross-functional teams within org, providing insights into our teams’ functions and how they can harness our automated security tools to meet their specific requirements.

Cybersecurity Intern

IBM
05.2021 - 12.2021
  • Kubernetes Automated Pen Test Toolkit: Built a toolkit that included the automation of the deployment and execution process of the tools: Kube-hunter, Kube-bench, and KubeWatch to assess the security posture of a Kubernetes Cluster; and integrated it with OpenShift and IBM Cloud Paks
  • Vulnerability Scanning Tool Assessment: Detect vulnerabilities in IBM Cloud Products before going out to customers, Analyze findings with Vulnerability Advisor, Twistlock, Anchore, Aquasec, etc
  • Compared Results – Helped determine false positives.
  • Analyzed system logs for suspicious activity, identifying potential threats before they caused damage.
  • Evaluated new cybersecurity tools and technologies, ensuring that the organization remained up-to-date on industry best practices.
  • Developed custom scripts to automate routine tasks, increasing efficiency within the cybersecurity team.

Software Reverse Engineer Intern

Booz Allen Hamilton
05.2020 - 08.2020
  • Researched and learned about Android Architecture from scratch
  • Contributed to building an emulator that can emulate S-Boot from the Samsung Galaxy S10 using QEMU
  • The QEMU emulator is used to be able to compile an ARM program on an x86 processor so we can run S-Boot(ARM program) on my PC(x86 processor) and provided us to see what was occurring behind the scenes that generally isn’t easily accessible.
  • Participated in failure analysis and debugging report activities.

Cybersecurity Engineer Intern

Parsons Corporation
08.2019 - 12.2019
  • Penetration Testing against my teams’ applications -Used NMAP, OpenVas, and Metasploit to help find, exploit, and patch vulnerabilities
  • Build Pipeline that will test security features on active devices – will determine which symbols on devices are safe to use before being considered, additionally, all symbols are checked second time and integrated into CMake
  • Built script to prevent loss of data and save all files to memory when server is down and automatically send files when server is up
  • Modified/Reviewed Teammates' code and gave suggestions.
  • Maintained up-to-date knowledge of industry trends and threat landscape through ongoing research and professional development activities.

Machine Learning and Special Projects Intern

Novetta
05.2019 - 08.2019
  • WhatsApp Translation and Classification Project – Parsed and translated many unstructured WhatsApp files; built three classifiers for three issues (Ebola, Security, Other)
  • These classifiers determined what chats were about without requiring the reading of thousands of messages
  • Automated Malware Detection Project – Contributed to research on specific Windows Malware Features; determined which are most common features Machine Learning Algorithm should pay attention to
  • Named Entity Recognition Project – Built NER Pipeline that’s given text, feeds it into pipeline, and runs three different libraries (NLTK, spaCy, StanfordNER) todetermine which library is best detecting specific entity
  • Transformed security processes from labor-intensive procedures requiring hundreds of man-hours to streamlined, automated solutions that deliver results in seconds, significantly boosting productivity and accuracy.
  • Developed strong working relationships with key stakeholders both internally and externally, fostering seamless collaboration on various assignments.

Network Security Engineer Intern

Expim Outstanding Cloud Solutions
06.2018 - 07.2018
  • Collaborated with team to ensure operational cyber security of Expim infrastructure
  • Assisted Expim team in identifying and resolving client network security issues
  • Learned computer networking as essential basics of Cyber Security
  • Identifying and repairing vulnerabilities.
  • Reduced cyber threats by conducting vulnerability assessments and recommending appropriate mitigation strategies.
  • Designed secure network architectures, incorporating best practices and latest industry standards.
  • Implemented necessary controls and procedures to protect information system assets from intentional or inadvertent modification, disclosure or destruction.

Education

Bachelor of Science - Computing Security, Cum Laude

Rochester Institute of Technology
Rochester
12.2021

Skills

  • Cybersecurity
  • Linux Distributions – Kali Linux, CentOS7, Ubuntu
  • Kubernetes - OpenShift
  • Computer Networking
  • Programming Language – Python, Bash
  • Penetration Testing – NMAP, Metasploit FTK SIFT-Workstation
  • Github
  • Security Automation
  • Threat Modeling
  • AccessHub

Certification

  • IBM – Architectural Thinking
  • IBM – Architectural Thinking for Security
  • Agile Explorer
  • Data Science Foundations
  • Enterprise Design Thinking Practitioner

Locations

New York City Metropolitan Area, New York

Timeline

Cybersecurity Architect

IBM
01.2022 - Current

Cybersecurity Intern

IBM
05.2021 - 12.2021

Software Reverse Engineer Intern

Booz Allen Hamilton
05.2020 - 08.2020

Cybersecurity Engineer Intern

Parsons Corporation
08.2019 - 12.2019

Machine Learning and Special Projects Intern

Novetta
05.2019 - 08.2019

Network Security Engineer Intern

Expim Outstanding Cloud Solutions
06.2018 - 07.2018

Bachelor of Science - Computing Security, Cum Laude

Rochester Institute of Technology
Jonathan Nissan