Neeraj Shetty joined Black Hills Information Security (BHIS) in Summer 2022 as a SOC Analyst. In this role, he investigates suspicious activities, and documents and reports on any information security […]
![Headshot Headshot](https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Headshot-921x1024-221x221.jpeg)
Neeraj Shetty joined Black Hills Information Security (BHIS) in Summer 2022 as a SOC Analyst. In this role, he investigates suspicious activities, and documents and reports on any information security […]
Hayden Covington joined Black Hills Information Security (BHIS) in the Summer of 2022 as a SOC Analyst. He chose BHIS after hearing many great things over the years and seeing […]
Ashwin Balasubramanya joined the team at Black Hills Information Security (BHIS) in Summer 2022 as a SOC Analyst. In this position, he investigates potential incidents and protects the organization against cyberattacks. […]
Scott Johnson joined Black Hills Information Security (BHIS) as a SOC Intern in the spring of 2022 and became a full-time SOC Analyst later that winter. He helps monitor and investigate […]
Phillip Woodward became Director of SOC Services for Black Hills Information Security (BHIS) in December 2021. Previously having managed a product development team at Diligent, he was drawn to BHIS’s […]
Michael Getman joined Black Hills Information Security (BHIS) in January 2022 as a SOC Analyst, responsible for monitoring and conducting analysis on log data. Previously, he worked as a technician and […]
Brian Godfrey joined the team at Black Hills Information Security (BHIS) in March 2022 as a SOC Analyst. In this role, Brian is responsible for helping BHIS and clients stay safe […]
Dave Hoff joined the Black Hills Information Security (BHIS) team in 2020 as a SOC Analyst, responsible for maintaining and running the BHIS SOC, including detection strategies, cluster infrastructure, and […]
Kiersten Gross joined the Black Hills Information Security (BHIS) team in April 2021 as a SOC Analyst, responsible for monitoring logs and conducting analysis to identify attacks. Previous to joining […]