Edward L. Hauser

  • Data Security Analyst / Python Developer
  • Cincinnati, OH
  • Member Since Jun 12, 2023

Candidates About

 

Edward L. Hauser

SUMMARY

IT experience individual contributor and leadership roles.  Most recent experience is on IT security using Windows and Linux based systems, tools and development to support PCI compliance requirements for a financial company.  Most significant programming achievement; creating an IPS application using Python in 2013 that saved the company approximately $200,000.  Application is still in use and in three different sites.  Created a Vulnerability management process in 2009 that ran scans, stored results and forwarded the results to a ticketing system that saved the company approximately $30,000.  Developed an Anomaly detection application data to look for intrusion activity.  Designed and programmed a VB.NET application for Human Resources that corrected a failing consultant timekeeping process by identifying discrepancies and allowing the accounting department to fix the time recording problems to correctly pay employees on time.  Application saved the company from negative public relations and the loss of employees who were not being paid and the loss of related contracts.

 

PROFESSIONAL EXPERIENCE

RESURGENT CAPITAL SERVICES (Cincinnati, Ohio)                                           2007 – Present

Data Security Analyst, Python Developer

Managed Security Operations by installing, supporting, and upgrading all Linux servers and security tools including Debian, CentOS, Red Hat, Tenable Security Center CV and the OSSIM SIEM suite of tools.   

·         Designed an intrusion prevention process (IPS) in 2013 using Python scripting, OSSIM platform, and Cisco Firewall.  The IPS process uses Snort events as input and is capable of Whitelisting by IP address and Snort SID.  The system has run time logging, error handling and database storage.  The system is capable of working in multiple locations of a company.  The function of the IPS system was made to be similar to the Sourcefire Next Gen Firewall system.  This IPS is currently doing the function that would have cost more than $200,000 in similar Sourcefire products.  The process is being used in three different sites.

·         Created a vulnerability management process by modifying the source for the open source OSSIM product to use Nessus to run scans and create a report to feed the data into a Remedy ticketing system in 2008.  The data is stored in a MySQL database and a Python script is used to query and process the data into an email, which the ticketing system parses and creates work requests for the system administrators. Programmed an anomaly detection process in 2013 to identify anomalous IP traffic using Python scripting and Netflow data.  The process has error logging and results are written to a MySQL database.

·         Provided oversite for Websense programs for content filtering and DLP use.

·         Created an Enterprise mapping process using a Bash script to detect, log and email alert on new hosts and new ports added to the entire network consisting of multiple sites in several states.

·         Run penetration tests for web applications using Kali, HP and Burp Suite.

·         Supported end point protection including logging review of (SEP) Symantec End point Protection.

·         Performed firewall configuration review.

·         Performed intrusion analysis using OSSIM SIEM and packet analysis.

·         Installed, tested, and proposed a virtual malware analysis process.

·         Participated in PCI audit compliance.

·         Performed incident response for intrusion and other events.

 

ROBERT HALF INTERNATIONAL (Cincinnati, Ohio)                                                           2007

Database Administrator

·         SQL server administration at client named ‘Resurgent Capital Services’.

 

POMEROY IT SOLUTIONS (Hebron, Kentucky)                                                             2004 – 2007

Database Administrator

Created a Visual Basic (6 and .NET) application in 2006 that would identify data discrepancies in one MS SQL system prior to the transfer of time keeping data to a Unix Progress database.  This application corrected the weekly process for time keeping to ensure all contract employees were paid properly.

·         Managed all SQL server administration and SQL development activities as the only SQL DBA on site.

 

HAUSER AUTO SALES (Aurora, Indiana)                                                                     2003 – 2004

Small Business Owner   

·         Owned and operated a state licensed automobile dealership.

·         Personally set up the business, including all requirements for the license and business operations.

 

LEAD’S BUSINESS ACCESSORIES (New Kensington, Pennsylvania)                               2002 – 2003

Lead Application Developer

·         Implemented SQL server clustering, and replication, used DTS and T-SQL for moving data.

·         Planned, determined specifications, purchased, installed, tested, implemented 15 servers for an entire IT department upgrade including SQL Server, Web, ISA, Exchange, Domain Controllers, and File servers.

 

MERCY HEALTH PARTNERS (Cincinnati, Ohio)                                                                   2002

Database Administrator

·         Performed daily administrative tasks including installing, backup, restore, log monitoring and disk space monitoring. 

 

MATRIX ASSET ALLOCATION, INC. (Cincinnati, Ohio)                                                       2000 – 2002

Developer / IT Manager

·         Managed all IT systems in a small financial company.

·         Managed and planned a database conversion from Access to SQL Server 7 including modifying VB.

 

ADDITIONAL EXPERIENCE

Systems Engineer, GVP NETWORK & SYSTEMS (Cincinnati, Ohio)

Network Administrator, AMERICAN COMPUTER SOLUTIONS (Cincinnati, Ohio)

Computer Technician, XLCONNECT (Cincinnati, Ohio)

Computer Technician, POMEROY COMPUTER RESOURCES (Hebron, Kentucky)

Helicopter Mechanic, UNITED STATES ARMY NATIONAL GUARD (Shelbyville, Indiana)

 

EDUCATION

Business Information Systems

Indiana Wesleyan University

 

Computer Engineering

Cincinnati State Technical College

 

Industrial Engineering

Northern Kentucky University

 

General Studies

Ball State University

 

67N10 Helicopter Mechanic School, United States Army

 

TECHNICAL SKILLS

Languages:  VB, T-SQL, Python, Perl, Bash

Software/Tools:  OSSIM, OSSEC, Snort, Suricata, Nessus, Ntop, Nagios, MySQL, Apache, OpenVAS, NetFlow, Wireshark, Nmap, Tcpdump, Metasploit, Tenable Security Center, PVS, LCE, Kali, IDA

O/Ss:  Windows, Linux – Debian, Kubuntu, Ubuntu, Red Hat, CentOS, Fedora

 

CERTIFICATIONS

ACSE Alienvault Certified Security Engineer 2014, CEH Certified Ethical Hacker 2013, CISSP Certified Information Systems Security Professional 2007, MCSE Microsoft Certified Systems Engineer 1998

CNE Certified Novell Engineer 1997, A+ Computer Technician 1996

 

PROFESSIONAL ORGANIZATIONS

INFRAGARD Cincinnati Chapter member since 2007