I am Nathan V. I am an experienced IT professional trained in the trenches at Microsoft, Amazon, the United States Army as well as various other companies. I am a work in progress, just like this page. My skills and experience are varied and somewhat eclectic. I’ve carried the titles of Application Engineer, Operations Engineer, Systems Engineer, Support Engineer, Technical Support Engineer, Systems Administrator, Information Assurance NCO, Computer Defense Assistance Program Analyst, and more that are just as exciting and ambiguous.
Perhaps a more valuable bit of information is that I’ve worked on systems ranging from Windows 3.11 to Ubuntu Server 14.04 and many things between. I presently use and maintain Amazon Linux, Arch Linux, Ubuntu, and Windows servers as well as various client operating systems. I’ve used VMWare, Hyper-V, and Amazon Web Services (AWS) virtual machines in production. I’ve configured and installed NetApp and EMC SANs over fiber and iSCSI. I’m deeply familiar with AWS services and technologies. I’ve worked on mission-critical production databases, front-ends, backup solutions, load balancers, networking devices, and more. I completed the Server+ certification while working in a 2500+ server datacenter.
Beyond the operations side of things I’ve completed the Security+ certification as well as many military security certifications. I’ve studied and taken classes for CEH as well as CISSP though I haven’t yet taken the exams. I similarly completed the Amazon Web Services Solutions Architecture class but didn’t take the test since it wasn’t really beneficial at the time. I’ve completed hundreds of hours of military training courses and have more Army certifications than I know what to do with. I’ve worked in Information Assurance and worn the white hat. I’ve found, identified, and exploited critical vulnerabilities in information systems.
While operations continues to be a large part of my practice and training the lion’s share is security. I regularly scour the web for information about the latest systems and their exploits as well as the current trends in malware. I have many virtual machines set up on different platforms to test with and target for exploitation. Time has been scarce lately to allow for full-on study and classwork so for now most of that critical reading remains finds online and personal research. Some of those finds will land here along with my comments or analysis. I’ll also share anything I find to be interesting in technology at the time as well.
Most of my time in security recently has been using Backtrack (now Kali) Linux and it’s tools built in, along with my own, to do network penetration testing. I’m familiar with the use of Core Impact and Metasploit. I primarily used eEye Retina and NMAP along with my own custom automation and some other things included with Backtrack.
When I originally created this site I wasn’t really much of a developer. I had dabbled a bit in PHP and some Perl and had eventually gone on to do some fun things with each but had never really done any serious development work. That has changed in the last few years. I’ve been spending most of my time writing services and automation in Ruby and Python and a fair share of that code is in production today driving services or simply as tools to get a job done. One of those services, today, is deployed internationally and is a business-critical function that enables the viewing, monitoring, managing, and configuring of a critical customer-facing service.
I’m quite enjoying development and look forward to more opportunities to use these skills in varying settings. Being much more familiar with Git (and GitHub) now I hope to be able to share some of the things I’ve been working on via that site.
If you have any further questions about me please feel free to shoot me an email and I’ll be happy to help if I can. Employment or consulting inquiries can be submitted in that format as well.