General Topics of all that is S

Cyber Security Toolkit – Michael W. Meissner


Michael W Meissner leads Ethernautics, Inc. Ethernautics-Logo-(Blue)Cyber Security Practice and is a multidisciplinary Cyber Security Program Manager, Solutions Architect and Cyber Security Design Engineer.MWM Logo

Mr. Meissner has 3 decades of Information Systems Design Experience, is versed in multiple “silo’s”, and has lead multiple full life-cycle implementations. Meissner’s efforts include deep understanding of 802.11 standards and has implement security solutions in both wired and unwired environments.
Experience working with Government security standards such as DISA STIG, DCID 6/3 and ICD-503.Me

Through education and experience Mr. Meissner has amassed extensive skills with the following Cyber Security Tools:

Defense in Depth - Target

  • Penetration Testing and Vulnerability Scanning
    • Meissner uses a combination of general purpose exploit frameworks:
      • Core Impact
      • Metasploit
    • Mr. Meissner has evaluated and deployed multiple Vulnerability Scanning tools at multiple enterprises to in order to conduct Pen testing, assess computers, computer systems, networks or applications for weaknesses. Mr. Meissner has performed 1000’s of scans both protect critical digital assets with the enterprise and to evaluate ability of non-authorized attackers looking to gain unauthorized access. Mr. Meissner has experience with the following Vulnerability Scanning tools:
      • Nessus
      • Retina
      • Qualsys
      • Foundstone
      • Nexpose
  • Security Information and Event Management (SIEM) – Mr. Meissner has had a variety of experiences evaluating, architecting, deploying, configuring and training personell with the following SIEM Solutions in order to support real-time analysis of security alerts generated by network hardware and applications:
    • Splunk
    • IBM QRadar
      • Installations exceeding 20k EPS
      • Asset Model Definitions
      • Rule Configuration
      • Dashboard Development
      • Offensive Work Flow Processes
      • Thorough Understanding of Correlation Concepts
  • IDS/IPS – Mr. Meissner has experience in evaluating and deploying several IDS and IPS tools that have assisted organizations in the identification and protection of their wired and wireless networks against several types of security threats. Mr. Meissner has experience with the following IDS/IPS/SIEM Solutions:
    • Sourcefire
    • Cisco IPS 4200
    • McAfee’s IntruShield/McAfee Network Security Platform (NSP)
    • SNORT
    • TippingPoint
    • Juniper IPS
    • Fortinet DCIPS
  • Password Management – Mr. Meissner has experience with the following Password Management Solutions:
    • Thycotic
  • Endpoint Security Tools/Anti-Virus/Anti Malware –Mr. Meissner has experience with the following Endpoint Security Solutions:
    • McAfee
    • Symantec
    • RSA ECAT
    • Microsoft Security Essentials
    • Kaspersky AV
  • Mobile Devices Management (MDM) – Mr. Meissner has effectively deployed MDM software o bolsters network security through remote monitoring and control of security configurations, policy enforcement and patch pushes to mobile devices. Deploying systems that remotely lock lost, stolen or compromised mobile devices and, if necessary, wipe all stored data. Mr. Meissner has experience with the following MDM Solutions:
    • Blackberry Enterprise Server BES10
    • AirWatch
    • IBM MaaS360 MDM
    • Citrix XenMobile
    • Symantec Mobile Management
    • McAfee EMM
    • Microsoft Enterprise Mobility Suite (EMS)
    • Cisco ISE
  • Network Access Control/Identity Access Management (IAM) Tools – Mr. Meissner has evaluated and deploy multiple Identity Access Management (IAM) systems at multiple enterprises to establish a framework for business processes that facilitates the management of electronic identities. To initiate, capture, record and manage user identities and their related access permissions in an automated fashion. Utilizing IAM technologies Mr. Meissner efforts have ensured that access privileges are granted according to one interpretation of policy and all individuals and services are properly authenticated, authorized and audited. Mr. Meissner has experience with the following Network Access Control/IAM Solutions:
    • IBM’s Security Identity Manager
    • Tools4ever’s
    • Centrify Identity Service
    • Thycotic Secret Server
    • Cisco ISE
    • 802.11 Architecture.
  • Next Generation Firewalls and Data Diodes – Mr. Meissner has experience with the following Next Generation Firewalls and Data Diodes :
    • Firewalls
      • Juniper
      • Cisco
      • Palo Alto Networks (PAN)
      • Checkpoint
      • Fortinet
    • Data Diodes
      • Canary
      • Waterfall
  • Incident Management and Computer Forensics – Mr. Meissner has experience with digital computer forensic tools used to produce evidence found on digital storage media utilizing techniques and principles to for data recovery, in order to identify, preserve, recover, analyze digital information designed to create a legal audit trail. Mr. Meissner has experience with the following Computer Forensic Solution:
    • AccessData
    • Netwitness
  • Authentications, Authorization and Control – Mr. Meissner authored Authentication, Authorization and Control for early Internet of Things (IoT) in the early 1990. United States Patent: 6070001. Authentications, Authorization and Control.
  • RSA
    • Led multiple complete life cycle efforts.
    • Security Analytics
    • Archer
    • SecOps
  • Cryptography
    • PKI – Public Key Infrastructure
      • Active Directory Certificate Services (ADCS)
      • External Providers
    • Hash functions
    • Certs
    • Experience with data encryption management solutions
      • Vormteric
      • CloudLink
  • Websense
  • Application Security Testing
    • Webinspect
  • Checkpoint
  • F5 Load Balancer
  • Remedy Networking
  • Cybercurrency
  • Application Monitoring
  • Security patching experience (VMware, RHEL and Windows patches)
  • * Atlassian suite of tools (Jira, Confluence, BitBucket), Git
  • Experience using Chef with GIT,VMWare vCloud or vSphere and/or public cloud environments such as AWS is highly desirable.

Cyber Security Architectures – Mr. Meissner is an experienced Information Technology Architect. Meissner bring years of best practice expertise in various architecture methods including SABSAZachman Framework, and TOGAF. Mr. Meissner has relevant technical skills to Solutions Architectures, Systems Architectures, Infrastructure Architectures as they pertain to Cyber Security Architectures and the engineering of defense in depth architectures.

Defense in Depth - Target

Solutions Architectures:

  • Microservices
  • Cloud
  • Virtual
  • Fintech
  • API Gateway
  • SOA
  • Vendor product and services assessment

Application Security Architecture:

  • Application architecture security assessment
  • Threat modeling
  • Application Security Testing
  • Secure coding practices
  • Software Assurance Maturity Assessment
  • Webservice Security
  • Cloud security
  • Cryptography (Hash functions, PKI, Certs, etc.)
  • Application Monitoring and Performance

Database Architecture

  • Strong RDBMS fundamentals and should have dealt with large Databases with high transaction volumes.
  • Familiar with multiple COTS RDBMS products and architectures
    • Oracle
    • Sybase
    • DB2
    • Ingris
    • Progress
  • Strong SQL Skills
  • Database Monitoring and Performance

Systems Architecture

  • Critical Digital Systems and Critical Digital Asset Assessment
  • Network Architecture

Infrastructure Architecture



General Topics of all that is S


IT Solutions Architects and Cyber Security Engineering

%d bloggers like this: