Profile

Hi, I'm Ian Norden. I enjoy tackling complex architectural problems, remaining flexible enough to resolve AppSec & CloudSec challenges. I've recently pivoted into a dedicated CloudSec leadership role, after helping build the Red Team at Intercontinental Exchange(NYSE: ICE), the leading network of regulated exchanges and clearinghouses for financial and commodity markets.

Experience

Manager - Cloud Security

Mar 2020 - Present

Placeholder for updates...

Senior Security Engineer - Application Security

Sep 2018 - Mar 2020

Returned to the App Security team to help resolve lingering talent acquisition gaps. Returned to lead and own the ICE Bug Bounty program and automating its findings pipeline. Introduced applog standards to support Cyber DFIR team, building automation requirements to auto-detect known apps to their respective Splunk logs once forwarded, validating continuous applog pipeline. Broadened the AppSec team's capability to risk assess Cloud SAAS deployments, and improve standards aligning Vendor Management and GRC teams. Started ICE's initial CloudSec assessments for Lambda use supporting ephemeral compute in AWS.

Senior Security Engineer - Red Team

Mar 2017 - Sep 2018

Recognized as a leader within InfoSec at ICE promoted to Senior level. Owned the buildout and maintenance of vulnerability scanning program. Leading most initiatives to create automated solutions through a Python automation project bringing together disparate InfoSec teams, tools, and solving manual processes. Architecting and implementating an always-on security controls testing platform, Verodin. Considered the ICE subject matter expert on TLS implementations and the internal crypto policy owner. Regularly develop and publish TLS cookbooks internally for standardization. Developed config standards for SSH and SFTP servers throughout ICE.

Security Engineer - Red Team

May 2016 - Mar 2017

Challenged as the first member of the Red Team to build a platform for penetration testing and scenario developement dors for automating Red Team scenarios, building networks and infrastructure for penetration testing. Managing numerous penetration testing vendors, executing against policy and best practices. Pursuing OSCP Certification. Developing a platform for automated assessment of SSH / SFTP configuration hardening to expand on the TLS / dashboard dev project. Own and manage the Bug Bounty platform.

Security Engineer - Application Security

Mar 2016 - May 2016

Created first hardening and configuration guidelines. Key resource in producing proof of concepts for improving password hashing standards. Continued aggressive expansion of the vulnerability scanning platforms. Developed a proof of concept HTML based Pentest Report Generation tool. Key automation resource for scripting heavy lift tasks from other InfoSec teams. Key resource in overhaul of vulenrability scanning policies. Built pentest produced POC's for internal use.

Security Analyst - Application Security

Mar 2015 - Mar 2016

On day one, challenged to overhaul, expand, and own the entire infrastructure vulnerability assessment platform. Expert technical resource for SSL / TLS hardening, created automated platform for scanning TLS configurations throughout the enterprise (inspired my personal SSLDash project). Wrote the vulnerability assessment policies and procedures. Coordinated numerous penetration tests of ICE web and thick client applications. Championed the AppSec Web App Dashboard project to automate clunky metrics, reduce human error, and enhance AppSec assessment capabilities using Python / Django. Lead resource in implementing Bug Bounty program.

Senior Security Engineer - Professional Services

Jan 2015 - Mar 2015

Lead role and customer advocate within the Security Professional Services. Lead on all customer engagements and a key technical resource for major sales engineering efforts. Performed numerous penetration testing scenarios and assessments. Overhauled reports to integrate with new toolsets and align with industry best practices. Re-engineered the Network Professional Services assessment infrastructure.

Security Engineer - Professional Services

Nov 2014 - Jan 2015

Built a new team and infrastructure within the Security Professional Services organization. Expanded and strengthened our vendor management functions for backfill on special tests coordinating numerous testers. Rewrote the penetration testing policies and procedures in a customer facing function. Planned an overhaul of all capabilities within the organization.

Security Analyst I & II - Enterprise InfoSec

Jan 2012 - Sept 2013

Part of a broad InfoSec team coordinating DFIR investigation, SIEM alert response, and vulnerability management. Grew vulnerability assessment to pre-production infrastructure. Lead resource for knowledgebase documentation. Lead for mentoring and training new team members through Analyst II.

Projects

My Resume Site :
This website, backed up thanks to Github.
Probable Word-lists :
I earned an attribution shout out for helping provide some lift (CPU @ homelab and bandwidth) to apply some better sort filtering in the early days.
Discover Scripts :
Trusted contributor to this OSINT and pentest automation resource.
DistroSeed :
I co-founded this open source project which is an automated assistant for finding, downloading, and managing Linux Distributions. Trying to solve the "what can I contibute to with just bandwidth and a spare PC"
SSLDash :
Beautiful dashboard for automated scanning, grading, and reporting on SSL / TLS strength for websites. Homelab style project to be open sourced.
Awesome-Sec-Talks :
I regularly contribute to this well maintained security talks and conferences reference.
"Home Lab" +Dashboard :
This homelab project will integrate each of my disparate VM's web interfaces, manage backups, and handle monitoring all in one concise web frontend (name to be improved).