John Farina
Details
Computer Science
University of North Georgia
2017 : 2019
Associate's degree
Computer Science
University of North Georgia
2014 : 2017
• Developing APIs with Python and the Flask framework to run queries on the company dataset, efficiently saving time with the added ability to perform bulk pulls of company data.
• Perform analysis on malicious links sent by customers to understand their purpose and report back findings to ensure the customer understands the risks associated with the URLs in question.
• Perform analysis on malicious files sent by customers, to include, pulling out malicious links, understanding the code being used in the malicious files, and report findings based on the threat.
• Work through internal applications to update or approve rules on customer emails by determining a threat level, which keeps customers from receiving malicious emails and ultimately keeping the organization safer.
• Conduct analysis on data collected by the Threat Intelligence team to produce additional reporting or additional visualizations.
2022 : Present
Fortra
Cybersecurity Researcher II
2021 : 2022
Fortra
Threat Research Analyst
• Assessed network and end-point behavior that threaten customer networks to detect and mitigate cyberspace threats.
• Utilized C++ to aid in the development of signatures used to sort through network traffic and identify malicious Cyber Actor activity.
• Utilized Python and Jupyter notebooks to develop solutions for analytical problems and tools to assist in the analytical process.
• Conducted analysis of metadata, by use of Agency specific tools and methodologies, to identify any malicious network activity that posed a threat to customer networks.
• Executed triage processes by efficiently tracking targets, observing abnormalities in network traffic, and reporting valuable intelligence, all in an attempt to assess and prioritize leads against the given target-set.
• Triaged customer alerts to ensure countermeasures and tasking are completed efficiently.
• Produced reporting on adversary tools, techniques, and procedures (TTPs) that were, consistently, viewed Agency-wide.
• Served in an active Team Lead position providing management to twenty-four civilian, military, and contractor personnel; to include, but not limited to : target and tool training sessions, time-off approvals, producing weekly reports, and ensuring the workforce is properly supported
2019 : 2021
National Security Agency
Computer Network Defense Analyst/Team Lead
Summer Intern Program for Information Assurance (SIP/IA) Participant
• Applied computer-based programs and various programming languages (Python and C++) to process data for analytical problems.
• Conducted Trend analysis against network/cyber activity by looking for networking patterns and protocols being used, in order to determine target traffic behavior patterns.
• Added, updated, or enriched information in mission-relevant databases.
• Conducted target analysis, target research, and analysis of metadata.
• Identified target communications within the global network.
• Selected, built, and developed query strategies against appropriate collection databases.
2018 : 2018
National Security Agency
Target Digital Network Analyst
• Organized and sorted through the downtimes of various machines while calculating a total monetary value lost during this time.
• Developed solutions to lower downtime rates, by identifying the variables that were affecting the rate of production and proposed possible solutions to upper management.
2017 : 2018
ElringKlinger
Data Analyst
Skills
Bash, C#, C (Programming Language), C++, Cascading Style Sheets (CSS), Cyber, Cyber Defense, Cyber Operations, Cybersecurity, Dart, Databases, Git, HTML5, Information Assurance, Information Security, Information Technology, Java, Network Defense, Network Security, Programming Languages, Python (Programming Language), Software Design, Software Development, Web Application Development, XML
About
IT Security professional with a bachelor’s degree in computer science from the University of North Georgia. Experience includes desktop, mobile, and web application development; signature development; network and target analysis; defensive and offensive cyber operations. Demonstrated leadership qualities by standing in as a team lead within a high-stakes, cyber environment. Extensive knowledge of networking fundamentals, defensive and offensive tools, and various programming languages.