Dekra Insight Jan 1, 2015 - Dec 11, 2016
Senior Process Safety Chemist
Chilworth Technology Ltd Jan 1, 2015 - Dec 11, 2016
Senior Process Safety Chemist
The Dow Chemical Company Apr 2009 - Feb 2013
Research Scientist
Rohm and Haas Nov 1981 - Apr 2009
Senior Scientist
Mcneil Pharmaceutical Jun 1, 1979 - Aug 1, 1981
Summer Pharmaceutical Research Position
Education:
Villanova University 1975 - 1981
Doctorates, Doctor of Philosophy, Organic Chemistry
Saint Joseph's University 1971 - 1975
Bachelors, Bachelor of Science, Chemistry
St. Joseph's Preparatory High School 1967 - 1971
St. Joseph University
Skills:
Chemistry Organic Chemistry Tga Polymers R&D Analytical Chemistry Process Simulation Polymer Characterization Polymer Chemistry Coatings Chemical Engineering Differential Scanning Calorimetry Catalysis Thermal Analysis Organic Synthesis Polymer Science Data Analysis Pharmaceutical Industry Research and Development Research Gas Chromatography Technology Transfer Process Research Lc Ms Nmr Chromatography Emulsions Surface Chemistry Uv/Vis Process Safety Ftir Inorganic Chemistry Specialty Chemicals Hplc Electrochemistry Formulation Mass Spectrometry Characterization Spectroscopy Surfactants Rheology Ir Gpc Process Development Process Chemistry Chemical Pharmaceuticals Chemicals
Joseph C. Magee - Prospect Park PA, US Alison M. Andrews - New York NY, US Mark W. Nicholson - Colts Neck NJ, US Jonathon Lance James - Jersey City NJ, US Henry C. Li - New York NY, US Christopher L. Stevenson - Westfield NJ, US Joel Lathrop - Jersey City NJ, US
International Classification:
G06F 21/00
US Classification:
726 24
Abstract:
Threat intelligence is collected from a variety of different sources. The threat intelligence information is aggregated, normalized, filtered and scored to identify threats to an information network. Threats are categorized by type, maliciousness and confidence level. Threats are reported to network administrators in a plurality of threat feeds, including for example malicious domains, malicious IP addresses, malicious e-mail addresses, malicious URLs and malicious software files.