United States Department of Defense
Program Manager and Research Engineer
Air Force Research Laboratory
Research Computer Scientist
The University of Texas at San Antonio Jan 2014 - Dec 2017
Research Assistant and Teaching Assistant
United States Air Force Sep 1, 2016 - Nov 2017
Cyberspace Operations Officer, 426Th Network Warfare Squadron
Dencom/Kforce Contractor Feb 2013 - Aug 2013
.Net Developer
Education:
The University of Texas at San Antonio 2013 - 2016
Doctorates, Doctor of Philosophy, Computer Science, Philosophy
The University of Texas at San Antonio 2011 - 2012
Masters, Computer Science
University at Buffalo 2003 - 2004
Bachelors, Computer Science
Skills:
Microsoft Office Microsoft Excel Microsoft Word Powerpoint Customer Service Research Teamwork Photoshop Social Media Public Speaking C++ English Access Windows Team Leadership Html C Leadership Java Linux
- Austin TX, US - Wright-Patterson AFB OH, US - Newark NJ, US Mir Mehedi Ahsan Pritom - San Antonio TX, US Huashan Chen - San Antonio TX, US Qiang Tang - Cliffside Park NJ, US Qian Chen - San Antonio TX, US Marcus Pendleton - Rome NY, US
International Classification:
H04L 9/40 G06Q 20/38
Abstract:
The present disclosure presents blockchain-based cyber security management systems and related methods. One such method comprises obtaining cyber intelligence input data from a cyber defender computing device, wherein the cyber defender computing device manages network security of a network, wherein the cyber intelligence input data identifies a cyber attacker or a victim of a cyber attack on the network; executing one or more Cyber Security Management (CSM) functions with the cyber intelligence input data received from the cyber defender computing device and cyber data stored in the blockchain ledger, wherein the cyber data stored in the blockchain ledger provides details on a cyber attack on a network that is managed by another cyber defender computing device; and outputting an alert to the cyber defender computing device with a potential cyber attacker or potential victim of the cyber attack on the network managed by the cyber defender computing device.