www.zuccaro.me Open in urlscan Pro
23.167.32.37  Public Scan

URL: https://www.zuccaro.me/about/
Submission: On November 16 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form>
  <input id="ghost-hunter-search-input" class="gh-search-bar" type="search" placeholder="Type to search">
</form>

Text Content

Skip to content
🖥🦠 Bryce Zuccaro


Hacker, Instructor, Pizza Lover

Hi! My name is Bryce, and I'm a professional red team operator based out of
Colorado. I love ethically breaking companies for fun and providing the report
for profit.

 * Home
 * Archive
 * Resume
 * Contact

 * 
 * 
 * GitHub

 * Home
 * Archive
 * Resume
 * Contact

 * 
 * 
 * GitHub


RESUME


JUMP TO:

PDF Download Experience Education & Certifications Volunteer Work



I am a passionate information security specialist with over 7 years of security
focused experience. I have proven experience in both red team (offensive) and
blue team (defensive) security as well as systems administration, networking,
and secure systems architecture. My professional interests lies in performing
adversarial simulations, in order to better inform my clients about their unique
threat landscape.

--------------------------------------------------------------------------------


EXPERIENCE


OFFENSIVE OPERATOR, NELNET :: JULY 2019 -- PRESENT

Internal penetration tester & red/purple teamer focused on ensuring Nelnet is
secure above and beyond mere PCI compliance requirements. All tests are from
nuts to soup, working with each relevant party to develop comprehensive rules of
engagement and scoping per the business's desired needs, ending with a
comprehensive findings report containing more than just vulnerability scan
results. Test types include:

 * PCI required segmentation and penetration testing for multiple business units
   against both network and web based targets
 * Long term red team engagements with the goal of providing a more realistic
   view of Nelnet's security posture against real world Advanced Persistent
   Threats (APTs)
 * Social Engineering to determine training program effectiveness as well as
   enumerate risk from successful phishing
 * Application reverse engineering & testing against newly deployed products
   within Nelnet

Additionally, I've spearheaded utilizing purple teaming techniques to improve
SOC response to offensive tactics, techniques, and procedures commonly used by
us and other APTs via:

 * Implementation of atomic testing to measure SOC response against MITRE's
   ATT&CK TTP framework
 * Assisting the SOC in tuning and improving visibility throughout Nelnet's
   environment
 * Assisting interested business units in implementing automated adversary
   emulation against their particular security concerns


ADJUNCT PROFESSOR, COMMUNITY COLLEGE OF AURORA :: AUGUST 2019 -- PRESENT

Adjunct Professor at the Community College of Aurora (CCA) in charge of
teaching:

 * CIS 128 - Introduction to Operating Systems: Focus on teaching students to
   first start troubleshooting operating systems
 * CNG 132 - Network Security Fundamentals: Security + preparation course
 * CNG 142 - Intro to Cloud Computing: Cloud+ preparation course
 * CNG 223 - Linux: Linux+ preparation course
 * CNG 256 - Vulnerability Assessment I: This is a course I have totally
   rewritten as a survey of basic penetration testing, while also including the
   core goals of vulnerability assessment techniques and goals.

In addition to teaching these courses, I also have created a 12 host ESXi
cluster, enabling CCA to provide students without their own computer capable of
virtualization ample hardware to participate in workshops and classes with a
virtualization requirement. This cluster is fully managed by VMware vCenter,
allowing for the advanced clustering features vCenter provides. I personally
have used this environment for implementing additional hands on content for
students in support of my own classes.


ADJUNCT PROFESSOR, RED ROCKS COMMUNITY COLLEGE :: AUGUST 2021 -- PRESENT

Adjunct Professor at Red Rocks Community College (RRCC) in charge of teaching:

 * CNG 256 - Vulnerability Assessment I: This is a course I have totally
   rewritten as a survey of basic penetration testing, while also including the
   core goals of vulnerability assessment techniques and goals.


SR. INFORMATION SECURITY ENGINEER, CENTURYLINK (VIA AQUISITION) :: MARCH 2018 --
JULY 2019

 * Deployed SaltStack to automate the monthly update tasks of 100+ Linux
   servers.
 * Performed systems administration duties on Linux & Windows servers when
   automation would not be feasible.
 * Helped manage vulnerability assessment for a 20,000 + endpoint PCI
   environment. Tasks included:
   ➢ Managed results in RiskSense from daily scanning of over 20,000 endpoints
   per quarter.
   ➢ Reached out to relevant stakeholders to ensure vulnerabilities are patched
   in a timely manner.
   ➢ Lead an initiative to migrate to a new PCI ASV vendor to improve workflow
   and reduce cost.
 * Assisted and performed penetration testing on web applications & network
   infrastructure.


SECURITY OPERATIONS ENGINEER, LEVEL 3 :: FEBRUARY 2017 -- FEBRUARY 2018

 * Managed enterprise firewall infrastructure in regards to policies and vpn
   configuration.
 * Enforced segmentation network policy for maintenance and creation of new
   firewall rules across the network.
 * Migrated firewall configurations between different platforms.
 * Responded to potential intrusion incidents using standard threat detection
   platforms.
 * Handled log management, backtracking user command input to determine outage
   causes.
 * Worked closely with the Security Operations Center to train them in new
   responsibilities.
 * Continued to develop simple python based tools to speed up day to day tasks.


SECURITY TECHNICIAN I & II, LEVEL 3 :: FEBRUARY 2015 -- FEBRUARY 2017

 * Analyzed packet captures to perform troubleshooting for network connectivity
   and DDoS issues.
 * Mitigated DoS attacks within a strict 15 minute SLA using null routes, ACLs,
   and heuristic filtering.
 * Managed edge firewall devices on behalf of customers to enable connectivity
   for their networks in regards to policy, NAT, web filtering, and UTM
   services.
 * Troubleshot IPsec & SSL VPNs and rules in edge firewall devices.
 * Automated tedious or time consuming tasks using Python.
 * Automated creation of ACLs for Juniper and Alcatel routers.
 * Automated searching our firewall config backups to search for customer
   firewalls.

--------------------------------------------------------------------------------


EDUCATION & CERTIFICATIONS


COLORADO STATE UNIVERSITY, BS COMPUTER INFORMATION SYSTEMS 2013


CERTIFICATIONS

 * Certified Red Team Operator - Issuer: Zero Point Security
   Badgr Badge

--------------------------------------------------------------------------------


VOLUNTEER WORK


DERPCON CO-FOUNDER :: 2020

Helped to create Derpcon, an online virtual security conference focused on
Denver Enterprise Risk Professionals (DERPs). This involved planning, marketing,
and culminated in acting as host for one of our three speaker channels. At the
conclusion of the conference, we managed to raise and donate over $20,000 to the
CO COVID fund, the official COVID charity run by the state of Colorado.
Official Derpcon Website


ROCKY MOUNTAIN CYBER COLLEGIATE DEFENSE COMPETITION (RMCCDC) RED TEAM :: 2020 -
2021

Red team member in yearly collegiate cyber challenge. We are pitted against
students tasked to defend a network, while simultaneously performing extra tasks
as handed down by the white cell (organizers). Red team members sole goal is to
throw as many wrenches in the student's plans as possible.


US CYBER CHALLENGE VTA :: 2021

--------------------------------------------------------------------------------


CTFS & OTHER ACCOMPLISHMENTS


SANS NETWARS WINNER

Have competed in and won multiple NetWars competitions, including:

 * 3x NetWars Core, including once at Tournament of Champions
 * 1x NetWars Defense v2
 * 1x NetWars DFIR

 * Home·
 * Archive·
 * Resume·
 * blog@zuccaro.me·

© 2023 🖥🦠 Bryce Zuccaro


SEARCH