Professional Documents
Culture Documents
8013
Westfield, MA 01085 julian.villan@gmail.com
Julian Villan
Passionate information security professional with over a decade of proven experience in high value
target environments. Currently seeking remote only contracts or FTE prior to 03.2020
Page 1
1 Oak street 212.991.8013
Westfield, MA 01085 julian.villan@gmail.com
Leveraged background in development and systems administration to communicate with developers and
sysadmins directly in resolving security issues. Commended by several clients in being able to expedite the
remediation process in time critical situations.
Lead UNIX Systems Engineer: Reality Check Network (Digital Ocean) – 10.2005 to 10.2006
Managed hosting for high-end small business clients, across 500 Linux and FreeBSD servers.
Increased client value by tuning various aspects of the LAMP stack for higher performance applications.
Developed an extremely proactive 24/7 monitoring system, with an average response time under 5 minutes.
Provided security expertise in implementing a variety of ecommerce shopping carts and credit card
processing systems. Monitored for unauthorized network activity, attacks on web applications, and forensics.
Configured switches and servers across multiple datacenters in a high bandwidth environment.
Skill Set:
Security:
Constantly remaining up to date on security models and evolving threats, such as local privilege escalation
attacks, remote exploits, SQL injection, XSS (Cross Site Scripting), CSRF (Cross Site Request Forgery), DNS
Poisoning/Pinning, Root kits, Denial of Service, Buffer overflows/under runs, session hijacking, authentication
bypass, and client based malware.
All aspects of cryptography and its secure implementation via SSL certificates, TLS, OpenSSH, as well as Full
Disk Encryption via PGP, TrueCrypt, and dmcrypt.
Fluent with CISSP and CEH principals, computer security regulations SOX, HIPAA, BS7799, and ISO 17799.
Tools: Metasploit, Burp, Qualysguard, Appscan, Webinspect, Nikto, Nessus, Nmap, Core Impact, Ollydbg, gdb,
Ikescan, Wireshark, HTTPwatch, Kismet, Airsnort, Aircrackng, Tripwire, Rkhunter, Encase, Sleuthkit, DDrescue,
Netcat, SSLDigger, WSDigger, Scanrand, Hping, Hydra, John the Ripper, Snort, Microsoft Security Analyzer
Operating systems:
Android, iOS, Linux, BSD, Windows, Mac OS X, virtualization via VMWare, Xen, KVM, and OpenVZ.
Understanding of local OS security principals, access controls, file permissions, memory protection.
Development:
Creating custom scripts to quickly solve tasks using BASH, sed, awk and other GNU tools.
Deep understanding of the LAMP stack and successfully implementing applications in high
traffic environments in frameworks such as Python, PHP, Perl, and Ruby.
Securely configuring web server software: Apache, IIS, and Websphere.
Networking:
Advanced proficiency in all aspects of internet operations, including DNS, the TCP stack, IPv6, and BGP.
In depth familiarity with the operations of datacenters and NOC’s, including best practices for working with
remote personnel, as well as on site maintenance and installation of servers, switches, et al.
Implementing and securing network architecture such as Cisco IOS, Cisco VPN, Checkpoint firewall & VPN
Secure Client, OpenVPN, 802.11 wireless auditing, Citrix Server, and VLAN’s.
Developing firewall rule sets in high traffic, high target environments using IPTables and PF.
Professional: Highly developed interpersonal communications ability. Able to convey technical information
effectively and courteously to people with varying levels of expertise. Approaches new technology with a genuine
interest that does not stop at the end of the business day. Conscious of correlation between detailed decisions to
“big picture” goals.
Page 2