Government Security
Network Security Resources

Jump to content

Cissp, Cism, Nsa-iam, Nsa-iem Professional

- - - - -
  • Please log in to reply
No replies to this topic

#1 Guest_F. Siepman_*

Guest_F. Siepman_*
  • Guests

Posted 24 April 2007 - 02:08 AM


Mr. Siepman has over 20 years of experience in the Information Technology field, with a focus on Information Technology Security in the last ten years. He is a Certified Information Security Manager (passed CISM exam 12/2006, awaiting cert), Certified Information System Security Professional (CISSP) and Information Systems Security Architecture Professional (ISSAP) who has an extensive background in working with Fortune 500 companies and government entities. Throughout his career he has published articles, presented to large audiences, provided security training, and managed security projects to successful completion. He has more than eight years of project management experience and has worked as manager for big 4 onsulting companies. Until July 1st, 2006 Mr. Siepman acted as the Vice President of Education for one of the largest chapter of the Information System Security Association (ISSA). He was responsible for all training programs that the chapter had to offer. Mr. Siepman has extensive experience working with commercial and government clients in the enterprise security space. He recently submitted his paperwork to receive his TS clearance.

Areas of Expertise
Enterprise Security Strategy System/Network Security Application Security
Disaster Recovery Certification and Accreditation Malicious Code Protection
Identity and Access Management Risk Assessments Project management

Technical Knowledge
This is just a short summary of key technical knowledge Mr. Siepmann posses:
Firewalls: Checkpoint Firewall-1, Cisco-PIX, Linux Kernel Firewall;
Access Control: Netegrity (CA) Siteminder, RSA Cleartrust, IBM (TIVOLI) Access Manager, Entrust GetAccess, TCP-Wrapper, RSA SecurID token, Checkpoint VPNs;
Assessment tools: ISS System-scanner, ISS Internet Scanner, ISS Database scanner,
Cybercop scanner, Satan, Saint, Nikto, NMAP, GFI LanGuard, Core
Impact, Cops, SSHscan, AppScan, Webproxy, Nexpose and other free tools;
Intrusion Detection: ISS Realsecure, Cybercop, ESM, ITA, Tripwire, SNORT;
Identity Manager: Sun/Waveset Lighthouse
Hardware: Intel PCs, Sun SPARC, IBM RS6000
Operating Systems: Windows XP/2K/NT/9x, Linux, Solaris, HP-UX, AIX, OS/2,DOS, Novell
Network: TCP/IP, Netware, Ethernet, VoIP
Databases: Informix, MySQL, Adabas, Oracle, Postgres
Web-server: Apache, Cern W3, NES, Iplanet, IIS
Web-proxies: Netscape's proxy server, SQUID proxy, Apache proxy
Languages: C, Perl, Pascal, Basic, SQL, C-Shell scripting, HTML, 68K Assembler, etc.
Other application: Project, Bind, Sendmail, Excel, Word, Powerpoint, VMware, SoftICE, etc.
Cryptographic solutions: OpenSSL, Entrust PKI
Secure Access: IPSEC-VPN, L2TP, SSL based VPN
Web attack methods: Cross-site-Scripting, SQL-Injection, Buffer-Overflows, LDAP-Injection
Antispyware/Antivirus: CA Pestpatrol, Webroot Spysweeper, MacAfee, Norton Antivirus, Search & Destroy, Adaware
Standards: ISO17799, ISO15408, Cobit 4.0, Grudschutzhandbuch, NIST SP800 series, HIPAA