Now you can Instantly Chat with Frederick!
About Me
Naval Cyber Warfare Developer/Tester: developed tools and testers in the information environment that ensure situational awareness and the ability to assess both friendly and enemy vulnerabilities and exploit them by delivering a customiz...
Intrusion Detection Systems were aggregated and analyzed to present situational awareness to those in need to know.
Show MoreSkills
Portfolio Projects
Description
Navy Surface Warfare, Philadelphia, PA (09/19-04/20 Developing a cyber vulnerability assessment tool for Naval Surface Warfare in Philadelphia to find vulnerabilities. Required simulation and modeling of a large network (I was able to reduce processing time from 2 weeks to 22 seconds by use of a Nvidia gpu and an optimized shortest paths routing algorithm).
* A NoSQL Allegro DB was used to support a Java 14 server to interface with the Nvidia gpus.
Show More Show LessDescription
SWARM links IO sensors, shooters and decision makers into a highly effective IO Force. Its advanced red team collaboration features enable team members to efficiently work together regardless of their location.
- Distributed C2 with real-time man and machine collaboration
- Shared situational awareness (SA)
Description
Developed and deployed a Promia’s Raven Intrusion Detection and Prevention (IDS/IDP). Allowed the client (US Navy) to view at any moment what the cyber threats were on the fleets.
Asset Detection and Monitoring
The Raven AssetViewer provides the most advanced 3-D visualization of Cyber Assets. All systems are automatically discovered through passive and active scanning without flooding your network.
Security Event Management
Raven continuously monitors network events for security breaches using a combination of our highly tailored Intrusion Detection Systems (IDS), proprietary network event monitor and third party IDS systems. We distill massive amounts of data down to a small set of critical incidents that demand your attention, while preserving event data remotely for further analysis.
Policy Management
Through dynamic, inline blocking, you can immediately stop threats to your systems in response to security incidents. Raven has one of the industry's most comprehensive block lists that alert you of malicious sources and allow you to stop them in their tracks.
Show More Show Less