Our Security Guides
Information Security can be confusing and overwhelming,
we’re here to guide you through from start to finish on your penetration test.
Beau has held positions in the financial and health industries and has experience with all aspects of enterprise network security including penetration testing, vulnerability analysis, data loss prevention, wireless security, firewall management, and employee security training. Beau is a Hack Naked TV host, and frequent speaker at industry events.
Brian has been interested in security from the time his family obtained their first computer. He found a passion for programming by learning to code, from there he learned to apply this knowledge to interacting with the physical world through signal processing, robotics, computer vision, and artificial intelligence.
Brian’s IT career started with telephone technical support, transitioned to supporting software dev toolkits, and eventually to leading a team focused on testing internal applications during corporate mergers. In 2008, he moved to information security, where he developed application security testing and reporting standards, before becoming a security analyst.
Craig got interested in security in college when he was studying computer science. He worked in software development for about 5 years after graduation and then just did security stuff as a hobby. Later he did some work for a government red team and now he is at BHIS.
Dakota started attending information security conferences while still in high school, and has been hooked ever since. Trained as a software developer, he is particularly interested in developing novel tooling and automation to make red teams more effective. He enjoys creating and contributing to open source projects and speaking at conferences and events.
Darin has a B.S. in Engineering and a Masters in Teaching. He previously taught mathematics, including Calculus and Statistics, and taught Java programming. He will be finishing a B.S. degree in Computer Information Technology in the coming months.
David has more than 20 years of IT experience working for the United States Air Force. During this time he worked in a wide array of disciplines including system administration, vulnerability management, boundary defense, web application programming, database programming/administration, installation level network operations, and research and development.
Derek has over 20 years of experience in the IT industry as a systems administrator for multiple operating system platforms, and monitoring and defending those systems from potential intruders. He has worked in the aerospace, defense, banking, manufacturing, and software development industries. Derek has experience with creating custom host and network based monitoring solutions.
Ethan has worked with BHIS since the beginning. Previously, he implemented defensive security solutions for the Exchange Online security team as a Microsoft intern. Ethan also competed on a programming team that placed 3rd in the International Collegiate Programming Competition Regionals, allowing them to compete in the ICPC World Finals.
James, better known as egypt, has worked as a developer, a vulnerability researcher, and a penetration tester. His most well known work has been as a contributor to the Metasploit Framework where he turned public proofs of concept into reliable open source exploits in addition to general maintenance and development of the world’s most-used exploitation […]
Joff has over 15 years of experience in the IT industry in roles such as enterprise network architect and network security defender. He has experience with intrusion detection and prevention systems, penetration testing, engineering network infrastructure defense, and software development. Joff also co-hosts the Security Weekly podcast.
John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much loved SANS teacher. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.
Jordan is one of Black Hills’ security analysts. He hails from the land of enterprise networking tech support, where stress was high and the challenges were strong. Most days, Jordan enjoys wireless research and malware sample packet data served with coffee.
Josh started his IT life on the helpdesk, from there he moved into client and server system administration before moving fully into IT security in 2002. In his 16 years of IT security experience, he has focused on engineering, security operations, system auditing and compliance, and system security management. Josh is a member of the U.S. Army Reserve, where […]
Kayla developed an interest in security while working towards her degree at the University of New Hampshire. She pursued this interest and has been working in the security field since 2015. In her spare time she enjoys staying active with activities such as hiking, biking, and kickboxing.
Kelsey started as an intern while attending South Dakota School of Mines and Technology, and started full time after graduation. She has previously worked in mobile development and in technical support.
Kent is a business school Masters graduate with a focus on Network Infrastructure Design and Management. He has experience in Higher Education Management, Finance, and SMB. His hobbies include woodworking, frisbee golf, and medieval architecture.
Lisa’s interest in coding started in high school, when she taught herself C++ to compete in a state-wide programming competition. In her free time, she works on a team that is developing a smart wheelchair for people with advanced mobility loss.
Matt is a teacher, writer, and hacker. He served as the Senior Cyber Tactics Development Lead for the U.S. Air Force. He is a guest instructor at UTSA and the SANS Institute as well as the author of SEC460. Matt is an avid supporter of cyber competitions including CCDC, Netwars, and CDX.
Michael began his career in 1997 as a Linux Administrator which eventually led to numerous offensive security roles, software development and hardware/software security research. Michael is also a lead forensics instructor for TeelTech, an Officer for OWASP Orlando (Chief Breaker) and an organizer for BSides Orlando.
Rick has over 15 years of experience in networking, system infrastructure, and deployment. His past experience includes working in an information systems capacity, engineering, and engineer management. Rick served in the Air Force and his career has involved medical systems, aerospace/defense, telephone, storage devices, radio frequency, wireless communications and other specific proprietary computing systems.
Sally has many years of experience in the IT field, holding positions as Application Developer, System Administrator, Security Analyst and Forensic Analyst. Sally has taught computer security courses at a local community college, but her most fulfilling teaching gig was homeschooling her children for ten years.