STEPHEN JOSEPH HILT II   

 

 

CAREER OBJECTIVE 

 

To lead researchers on successful projects that ensure the best protection of customers, and victims around the world. To work with law enforcement to ensure that criminals are stopped where they can be to further protect customers, victims, and future victims. Provide my children with a safer world on the internet by working to protect not only them but others from harm on the internet. 

 

 

EXPERIENCE AND ACCOMPLISHMENTS 

  

Trend Micro

        Sr. Threat Researcher - April 2015 – Present

§     Develop, Plan and Lead Research into Cybercrime, Nation States, and Emerging Threats 

§     Honeypot designs, deployment, and monitoring 

§     RF Technologies 

§     Numerous research publications and conference speaking engagements 

§     https://stephenhilt.com/publications.html

 

Digital Bond Inc. 

       ICS Security Consultant – April 2013 – April 2015 

§     Lead Control Systems Security Assessments 

§     Control Systems Nmap Scripts  

§     Enip-info 

§     S7-info 

§     Bacnet-info 

§     Protocol Fuzzing (Python/Ruby) 

§     PLCPwn – S4x14 Presentation 

§     Coolest Hacks Of 2014  §      Radio Frequency Assessments GnuRadio/KillerBee/RFCat 

§     Custom Nessus Audit Files 

§     DerbyCon 4.0 Speaker 

§     CSO Online 

§     ICS Capture the Flag at S4x15 

 

TENNESSEE VALLEY AUTHORITY  

 

Senior Information Security Specialist- March 2009 – April 2013 

  

§  Implement and Maintain Tenable Security Center 

§  Lead Control Systems Security Assessments 

§  Lead Penetration Tester 

§  Test for Regulatory Compliance (FISMA, NERC, etc) 

§  Presenter ISC Joint Working Group April 2010 

§  JTCA MCRP (ATR/OST) Participant With Critical Intelligence 

§  NERC CIP SME (CIP 005/CIP 007) 

§  CyberStorm III and GridEX  Scenario Developer 

§  Obtained Secret Clearance 

 

Real-time Process Systems Specialist - Aug 2006 – March 2009 

         

§   OSPF Design and Implementation 

§   Configuration and Maintenance of Control Systems Networks 

§   PIX and ASA Configuration  

§   Cisco Wireless LAN Controller  

§   SSL VPN Implementation 

§   Maintain RSA SecurID Configuration 

§   Routing and Switching 

§   CA Spectrum Administration 

§   Cisco Secure Access Control Server (ACS) Configuration  

§   Nessus vulnerability scans (Corporate Networks and Control Systems) 

§   IBM AppScan vulnerability scans 

§   National SCADA Test Bed Advanced Training (Red Team) 

 

CURRICULUM AND INSTRUCTION AT SOUTHERN ILLINOIS UNIVERSITY-CARBONDALE 

Systems Administrator - Aug 2004 – MAY 2006 

 

§  Administrator of SuSE and Red Hat Linux Servers 

§  Administrator of Macintosh OS X (Panther and Tiger) Server 

§  Administrator of Windows Server 2003 

§  Administrator of Macintosh Computer Labs 

 

  

EDUCATION & TRAINING 

 

SOUTHERN ILLINOIS UNIVERSITY-CARBONDALE 

Bachelor of Art in Computer Science – May 2006   

 

JOHN A. LOGAN COLLEGE  

Associate in Arts – May 2003  

  

CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) 

CERTIFIED ETHICAL HACKER (C|EH)  

CERTIFIED PENETRATION TESTER  

CISCO CERTIFIED NETWORK ASSOCIATE (CCNA)  

CISCO CERTIFIED SECURITY PROFESSIONAL (CCSP)  

CISCO CERTIFIED IOS SECURITY SPECIALIST  

CISCO CERTIFIED INFORMATION SECURITY SPECIALIST  

CISCO CERTIFIED FIREWALL SPECIALIST   

CISCO CERTIFIED IPS SPECIALIST  

INFRASTRUCTURE LIBRARY