“I had the pleasure of coaching Bryon apart of the ISC2 Chapter of NJ, Bryon is a great listener and gets involved with the conversation. He also provides great feedback and challenges the situation when he thinks of another idea to reduce risk. Bryon is a consummate professional and extremely knowledgeable in his application of security to high level Cyber Operations projects while considering, understanding, developing and treating risk. He understands getting behind a project while maintaining all security requirements. I now have the pleasure of working with Bryon on the ISC2 NJ Chapter Board!”
About
A leader that understands the security operations and challenges in the current and…
Contributions
-
How can you develop a cybersecurity career with digital learning?
In my opinion, best way to learn is to join clubs and local organizations that offer cyber and other IT trades that may get you to your goal. One way I achieved hands on experience in my early days was volunteering at an IT company for free and spending time learning how the operations work. This gave me an idea of what area interested me and what to pursue in college.
-
How can you develop a cybersecurity career with digital learning?
Ways to continue your education 1. Google is your best friend 2. YouTube also apart of google :) 3. Coursera or other online learning platforms offers free and affordable courses. 4. Online college to obtain a degree of your choosing. 5. Join an organization and they may have free mentorship and training. (iSC2 local chapters)
-
How can you develop a cybersecurity career with digital learning?
Some ways to get started: - understand what the roles of cybersecurity play in the different areas. - understand networking, how devices are connected and how they play a role within businesses (network+) - understand windows and Linux systems because these are the operating and kernels used within the businesses. (Microsoft offers free resources) - take cyber awareness training to get an idea from an end user perspective what professional cyber security experts are trying to teach others to combat. This fight isn’t just including cyber experts it’s everyone within the company.
Activity
-
I recently had to come up with a project and was deciding to do something simple that would make my life easier in analyzing attacks and IPs. So I…
I recently had to come up with a project and was deciding to do something simple that would make my life easier in analyzing attacks and IPs. So I…
Liked by Bryon Singh
-
Highly recommend AKYLADE certifications for cyber pros looking to upskill. Had a great experience working with their dev team. AKYLADE Certified…
Highly recommend AKYLADE certifications for cyber pros looking to upskill. Had a great experience working with their dev team. AKYLADE Certified…
Liked by Bryon Singh
-
Doing our part to support the people, employers, and communities in the state of New Jersey by offering short-duration programs in 21st century…
Doing our part to support the people, employers, and communities in the state of New Jersey by offering short-duration programs in 21st century…
Liked by Bryon Singh
Experience
Education
-
Capella University
-
Capella helped me build the knowledge and experience in cybersecurity to mitigate risk, design solutions, and identify opportunities for effective change. Prepared to manage data and information security, then apply what I learned in a real-world setting. Worked with tools such a as splunk , Nessus, Nmap, ollydbg, immunity debugger, http watch, Kali Linux, windows servers. Firewalls and other open sources tools.
-
-
Linux Operating System
Advanced C++
Data Structures
Advanced Data Communications
Microprocessors
Microprocessor Interfacing & Control
Calculus (I and II)
Linear Algebra
Advanced Mathematical Analysis
-
-
Activities and Societies: IEEE and Robotics
Awards:
Rework Soldering SMT Certificates’, Tech Fee Internship, Joseph B. Aidala, and Memorial award
UNIX/Linux
Network and Data Communications
Computer Programming I &II (C++)
Computer Programming I & II (C language)
Server Administration - Exchange
PC Troubleshooting
Control Systems
Electronics
Operations Amplifiers
Physics I & II
Digital Circuits
Licenses & Certifications
-
An Introduction to Interactive Programming in Python (Part 2)
Rice University
IssuedCredential ID https://www.coursera.org/account/accomplishments/certificate/5D6K4QTKF5 -
An Introduction to Interactive Programming in Python (Part 1)
Rice University
IssuedCredential ID https://www.coursera.org/account/accomplishments/verify/36PJ4RNM6J
Volunteer Experience
-
Board Member
(ISC)2 New Jersey Chapter
Education
- Communications Cochair
- Built and currently administering ISC2 New Jersey Chapter’s Discord Server.
-
Donor
The Hunger Project
- Present 7 years 11 months
Disaster and Humanitarian Relief
Raising Money for Donations - I am a Capella Student
The Hunger Project is a global, non-profit, strategic organization committed to the sustainable end of world hunger. In Africa, South Asia and Latin America, The Hunger Project seeks to end hunger and poverty by empowering people to lead lives of self-reliance, meet their own basic needs and build better futures for their children. The Hunger Project carries out its mission through three essential activities: mobilizing village…Raising Money for Donations - I am a Capella Student
The Hunger Project is a global, non-profit, strategic organization committed to the sustainable end of world hunger. In Africa, South Asia and Latin America, The Hunger Project seeks to end hunger and poverty by empowering people to lead lives of self-reliance, meet their own basic needs and build better futures for their children. The Hunger Project carries out its mission through three essential activities: mobilizing village clusters at the grassroots level to build self-reliance, empowering women as key change agents, and forging effective partnerships with local government. -
College Intern - Engineering & Technology
City University of New York
- 2 years
Science and Technology
ET-991, 992, 993 Cooperative Education in Engineering Technology
Completed 3 Intern level courses directly mentored by the CTO and Departmental Chairperson.
- Assisted CTO (or designee) with current projects along with revamping entire Engineering Technology departments inventory.
- Learned and developed skills in information technology to include networking of computers, system wide back up of data, and storage of data.
- Developed skills to communicate with IT/Engineering…ET-991, 992, 993 Cooperative Education in Engineering Technology
Completed 3 Intern level courses directly mentored by the CTO and Departmental Chairperson.
- Assisted CTO (or designee) with current projects along with revamping entire Engineering Technology departments inventory.
- Learned and developed skills in information technology to include networking of computers, system wide back up of data, and storage of data.
- Developed skills to communicate with IT/Engineering professionals who specialize in Systems Software Design Engineering and Computerized 3D-Printing.
- Assisted staff in performing system backup and maintenance functions.
- Assisted in installation of PC hardware and software.
- Assisted in network and hardware troubleshooting. -
Student
OWASP Foundation
- Present 7 years 8 months
Science and Technology
Utilizing OWASP for my studies in Penetration Testing.
-
Aftershool Technology Teacher
YMCA of Greater New York
- 8 months
Education
- Aided the Educational Director on developing hands on computer labs for Kindergarten through 5th grade.
- Developed standard policies for schools computer lab.
- Assisted with after-school subject mentoring. -
Teacher Assistant
NASA Glenn Research Center
- 1 year 1 month
Education
Now called the The MUREP (Minority University Research and Education Project) Aerospace Academy
Location: CUNY York University Jamaica Queens, NY
The MUREP Aerospace Academy (MAA) goals are to: improve STEM literacy by engaging K-12 students, family members, and teachers through the integration of emerging technologies; and to educate students utilizing a STEM curriculum that meets national science, technology, engineering and mathematics standards aligned to NASAs mission…Now called the The MUREP (Minority University Research and Education Project) Aerospace Academy
Location: CUNY York University Jamaica Queens, NY
The MUREP Aerospace Academy (MAA) goals are to: improve STEM literacy by engaging K-12 students, family members, and teachers through the integration of emerging technologies; and to educate students utilizing a STEM curriculum that meets national science, technology, engineering and mathematics standards aligned to NASAs mission directorates.
Links:
http://www.ny1.com/nyc/queens/news/2017/02/11/students-learn-about-stem-education-at-aerospace-academy-in-queens.html
https://www.york.cuny.edu/academics/departments/arts-and-sciences/semaa
https://www.nasa.gov/centers/glenn/home/index.html
Publications
-
I Don't Care ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
This line from “The Fugitive” portrays Dr. Richard Kimble (played by Harrison Ford), a vascular surgeon who was wrongly convicted of his wife's murder. After escaping custody, he set out to prove his innocence while being pursued by Deputy Marshall, Samuel Gerard (played by Tommy Lee Jones). In a face-to-face standoff, Richard says, “I didn’t kill my wife.” Deputy Gerard responds with, “I don’t care.” One of the best responses to that line, in my humble opinion. But that’s not what we’re here…
This line from “The Fugitive” portrays Dr. Richard Kimble (played by Harrison Ford), a vascular surgeon who was wrongly convicted of his wife's murder. After escaping custody, he set out to prove his innocence while being pursued by Deputy Marshall, Samuel Gerard (played by Tommy Lee Jones). In a face-to-face standoff, Richard says, “I didn’t kill my wife.” Deputy Gerard responds with, “I don’t care.” One of the best responses to that line, in my humble opinion. But that’s not what we’re here to talk about.
Dr. Richard Kimble successfully enters a secure hospital area by creating a fake access badge. This moment highlights a key vulnerability: single-factor authentication. The hospital relied solely on a physical access badge to grant entry, offering clever intruders like Kimble an opportunity to exploit the system.Other authorsSee publication -
Would You Like to Play a Game? ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
One of my favorite movies is WarGames. If you haven’t seen it, stop reading immediately cause I’m going to spoil it for you.
In the movie, David Lightman (played by Mathew Broderick) uses a technique called wardialing, where his computer dials every phone number in a given area to find a modem at the other end. David discovers a modem for a military supercomputer aka WOPR (War Operation Plan Response, because everything needs an acronym). Once he's connected, he relies on easily…One of my favorite movies is WarGames. If you haven’t seen it, stop reading immediately cause I’m going to spoil it for you.
In the movie, David Lightman (played by Mathew Broderick) uses a technique called wardialing, where his computer dials every phone number in a given area to find a modem at the other end. David discovers a modem for a military supercomputer aka WOPR (War Operation Plan Response, because everything needs an acronym). Once he's connected, he relies on easily guessable passwords, combined with knowledge of the developer's personal life (like the name of the developer's deceased son), to gain unauthorized entry.Other authorsSee publication -
This Message Will Self Destruct.. ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
In "Mission: Impossible," one of the most iconic scenes involves Ethan Hunt (played by Tom Cruise) infiltrating a highly secure CIA facility at Langley to steal the NOC list, a comprehensive list of all covert agents. To access this room, Hunt has to bypass multiple security measures:
Temperature Regulation: The room is temperature-controlled. A sudden rise could trigger the alarm. Ethan and his team have to ensure that his body heat doesn't increase the room's temperature.
Sound…In "Mission: Impossible," one of the most iconic scenes involves Ethan Hunt (played by Tom Cruise) infiltrating a highly secure CIA facility at Langley to steal the NOC list, a comprehensive list of all covert agents. To access this room, Hunt has to bypass multiple security measures:
Temperature Regulation: The room is temperature-controlled. A sudden rise could trigger the alarm. Ethan and his team have to ensure that his body heat doesn't increase the room's temperature.
Sound Sensors: The room is equipped with sensitive acoustic sensors. Any noise louder than a whisper can set off the alarm. Hence, Ethan has to move very quietly.
Pressure-sensitive Floor: The floor is loaded with pressure sensors. Ethan can't touch the floor, which is why he's suspended from the ceiling with ropes and harnesses.
Retina Scanner: The computer holding the NOC list is secured with a retina scan. Ethan has to dangle right above the desk and use a gadget to capture the eye scan of a rightfully authorized person (in this case, the man who enters the room before the heist begins) and then replicate it to gain access.Other authorsSee publication -
You Got Your Best Friend Back ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
In Iron Man 2, Ivan Vanko hacks into Lt. Col. James 'Rhodey' Rhodes’ suit (a.k.a. War Machine, Iron Patriot) and programs it against Iron Man. Ivan locks out everyone from Stark Industries and from Hammer Industries, the company that paid him to build the Iron Man-competitive suits. Ivan Vanko ended up building drones instead of suits because “People make problems. Trust me. Drone better”.
This is a great example of an automated process to revoke access to an Enterprise Asset aka War…In Iron Man 2, Ivan Vanko hacks into Lt. Col. James 'Rhodey' Rhodes’ suit (a.k.a. War Machine, Iron Patriot) and programs it against Iron Man. Ivan locks out everyone from Stark Industries and from Hammer Industries, the company that paid him to build the Iron Man-competitive suits. Ivan Vanko ended up building drones instead of suits because “People make problems. Trust me. Drone better”.
This is a great example of an automated process to revoke access to an Enterprise Asset aka War Machine. An even better example is that the access of War Machine from Lt. Col. James Rhodes was revoked, not deleted, so Black Widow could re-enable access and there could be another happy ending to a Marvel Movie.Other authorsSee publication -
Point Break ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
One of my favorite scenes in Thor: Ragnarok was when Thor attempted to escape the junk planet. He made it to the Quinjet and tried many different activation codes (access) such as: "Thor", "Son of Odin," and "Strongest Avenger" (twice). None worked. It was only when he said “Point Break” did the Quinjet start. Point Break was the activation code that Tony Stark had assigned him back from the 2012 Avengers movie.
Unauthorized access to sensitive information is one of the most significant…One of my favorite scenes in Thor: Ragnarok was when Thor attempted to escape the junk planet. He made it to the Quinjet and tried many different activation codes (access) such as: "Thor", "Son of Odin," and "Strongest Avenger" (twice). None worked. It was only when he said “Point Break” did the Quinjet start. Point Break was the activation code that Tony Stark had assigned him back from the 2012 Avengers movie.
Unauthorized access to sensitive information is one of the most significant threats that enterprises face. Whether it's an external attacker exploiting vulnerabilities, or an internal employee with malicious intent, the potential for data breaches is a constant concern.Other authorsSee publication -
A Wand For Each Wizard ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
One of the most famous wizards of all time, Harry Potter, learned that he was destined to attend Hogwarts School of Witchcraft and Wizardry on his 11th birthday. It was then that Harry acquired his first wand at Ollivanders shop in Diagon Alley.
Other authorsSee publication -
It’s An Older Code Sir, But It Checks Out ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
If you’re a geek like me, you remember the above line from Star Wars Episode VI: Return of the Jedi where a strike team posing as an engineering crew gives a stolen (dormant) authorization code as they attempt to pass through a security checkpoint.
Other authorsSee publication -
What's Your Password ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
If you’ve ever seen Jimmy Kimmel Live, I hope you’ve seen the “What’s your Password” skit. As funny, and as incredibly disappointing this is, it’s real life. We’re not in Kansas anymore folks. Many years ago, all we needed to do to protect our assets was lock our door. Now, our assets are spread across a virtual kingdom.
Other authorsSee publication -
Bears, Beets, Battlestar Galactica ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
“Identity theft is not a joke, Jim.” If you’re not familiar with this reference, please DM me as we have much to discuss. For context, the line above is said by Dwight K. Schrute, a character played by Rainn Wilson in the TV series The Office. In this episode a colleague impersonates Dwight, causing the line above. Once again, Dwight highlights the importance of account/identity security within an organization without hiding weapons throughout the office.
Other authorsSee publication -
Bears, Beets, Battlestar Galactica ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
“Identity theft is not a joke, Jim.” If you’re not familiar with this reference, please DM me as we have much to discuss. For context, the line above is said by Dwight K. Schrute, a character played by Rainn Wilson in the TV series The Office. In this episode a colleague impersonates Dwight, causing the line above. Once again, Dwight highlights the importance of account/identity security within an organization without hiding weapons throughout the office.
Other authorsSee publication -
WOW! ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
If you ever played the massively multiplayer online role-playing game (MMORPG) World of Warcraft, you entered a fantastical world where you create a character, embark on quests, and explore vast virtual landscapes.
In the early days of "World of Warcraft," the default account for players was the "Guest" account. The account had limited capabilities and was mainly meant for players who were trying out the game before subscribing to a full account. Not surprisingly, some players discovered…If you ever played the massively multiplayer online role-playing game (MMORPG) World of Warcraft, you entered a fantastical world where you create a character, embark on quests, and explore vast virtual landscapes.
In the early days of "World of Warcraft," the default account for players was the "Guest" account. The account had limited capabilities and was mainly meant for players who were trying out the game before subscribing to a full account. Not surprisingly, some players discovered that the "Guest" account had certain vulnerabilities, allowing them to exploit the system and gain unintended advantages.Other authorsSee publication -
Mr. Robot ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
If you were lucky enough to watch Mr. Robot (no judgement here, please!), you learned some valuable lessons on implementing robust security measures and seeing how they can be compromised. In this blog, we will explore how the show's character, Tyrell Wellick, exemplifies secure asset and software management through version-controlled-infrastructure-as-code and accessing administrative interfaces via Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS).
Other authorsSee publication -
System is Armed! ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
Many homeowners invest in home security systems to protect their property and loved ones. These systems often include components such as alarms, surveillance cameras, and access control measures. They act as a deterrent against intruders and provide peace of mind by ensuring the safety and security of the household.
Other authorsSee publication -
Um, Yeah, No! ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
I’ve heard this many times in my life from a bouncer at a club/event. Sometimes it was my ID, sometimes there were too many people already in, and sometimes it was because, well, they just said no.
Nightclubs and events employ bouncers to control access and maintain security within the venue. Bouncers act as a barrier between the outside world and the controlled environment inside, ensuring that only authorized individuals are granted entry.Other authorsSee publication -
Do You Have Your Keys? ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
My girlfriend asks me this question almost every time we leave our home. Why, you ask? Because I’ve forgotten my keys more often than I should and then been locked out. This happens because our front door automatically locks when we leave as a safety precaution. Maybe I need to replace my Ted Lasso “BELIEVE” sign with a “Do you BELIEVE you have your keys?” sign.
Other authorsSee publication -
(Configuration) Drift Away ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
You may know "Drift Away" is a song by Mentor Williams written in 1970 and originally recorded by John Henry Kurtz on his 1972 album Reunion. Mentor Williams was a country songwriter, and John Henry Kurtz was an actor and swamp rock singer. Dobie Gray then recorded/performed that famous song in 1973.
Other authorsSee publication -
(Configuration) Drift Away ft. Bryon Singh, RailWorks Corporation
Gotham Technologies LLC
You may know "Drift Away" is a song by Mentor Williams written in 1970 and originally recorded by John Henry Kurtz on his 1972 album Reunion. Mentor Williams was a country songwriter, and John Henry Kurtz was an actor and swamp rock singer. Dobie Gray then recorded/performed that famous song in 1973.
Other authorsSee publication -
Fort Knox Got Nothing On Me
Gotham Technology Group
Fort Knox is a United States Army post located in Kentucky and is famous for housing the United States Bullion Depository, which holds a significant portion of the country's gold reserves.
Fort Knox serves as a symbol of impenetrable security due to its robust physical and technological defenses. Similarly, in the digital realm, secure configuration acts as a virtual Fort Knox for enterprise assets and software, ensuring that they are protected against unauthorized access, data breaches,…Fort Knox is a United States Army post located in Kentucky and is famous for housing the United States Bullion Depository, which holds a significant portion of the country's gold reserves.
Fort Knox serves as a symbol of impenetrable security due to its robust physical and technological defenses. Similarly, in the digital realm, secure configuration acts as a virtual Fort Knox for enterprise assets and software, ensuring that they are protected against unauthorized access, data breaches, and other cyber threats.Other authorsSee publication -
The Secret Handshake
Gotham Technology Group
This blog just leveled up. My good friend and colleague Bryon Singh, Director of Security Operations at Railworks Corporation has agreed to collaborate on this blog to bring not only the WHY but also the WHAT & HOW to becoming more secure. Hope you enjoy!
Other authorsSee publication
Languages
-
English
-
Recommendations received
20 people have recommended Bryon
Join now to viewMore activity by Bryon
-
A SIMPLIFIED GUIDE >>> Think of - • DNS as the phonebook of the internet, ⤵️ • Translating human-readable domain names (like google.com)…
A SIMPLIFIED GUIDE >>> Think of - • DNS as the phonebook of the internet, ⤵️ • Translating human-readable domain names (like google.com)…
Liked by Bryon Singh
-
Harry is a great speaker! Come check him out!
Harry is a great speaker! Come check him out!
Liked by Bryon Singh
-
I passed the AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) [CRP-002] Exam. This certification evaluates practical knowledge of the NIST…
I passed the AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) [CRP-002] Exam. This certification evaluates practical knowledge of the NIST…
Liked by Bryon Singh
-
Summing up the RSA conference is quite a challenge, but I can definitely say I enjoyed it! Meeting partners and customers face-to-face, attending…
Summing up the RSA conference is quite a challenge, but I can definitely say I enjoyed it! Meeting partners and customers face-to-face, attending…
Liked by Bryon Singh
-
🌸 Happy Mother's Day and Weekend to all the incredible moms out there! 🌸 I want to take a moment to celebrate the remarkable women who have shaped…
🌸 Happy Mother's Day and Weekend to all the incredible moms out there! 🌸 I want to take a moment to celebrate the remarkable women who have shaped…
Liked by Bryon Singh
-
I took the hard route to where I am today. Some of it my fault, some of it due to external causes and factors that couldn’t be helped. It’s…
I took the hard route to where I am today. Some of it my fault, some of it due to external causes and factors that couldn’t be helped. It’s…
Liked by Bryon Singh
-
I want to say a heartfelt thank you to the Essex County Education Association - ECEA for the awesome honor of choosing me for the Racial Advocacy…
I want to say a heartfelt thank you to the Essex County Education Association - ECEA for the awesome honor of choosing me for the Racial Advocacy…
Liked by Bryon Singh
-
Been a Rubrik reseller and customer for over 7 years and wish them the best of luck! Great partnership, great product, great people. Thanks Bridget…
Been a Rubrik reseller and customer for over 7 years and wish them the best of luck! Great partnership, great product, great people. Thanks Bridget…
Liked by Bryon Singh
-
Thrilled to announce that I've recently earned the AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) certification! This certification dives…
Thrilled to announce that I've recently earned the AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) certification! This certification dives…
Liked by Bryon Singh
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Bryon Singh
1 other named Bryon Singh is on LinkedIn
See others named Bryon Singh