RICK LAHAYE(25)                Curriculum Vitae                 RICK LAHAYE(25)

NAME

Rick Lahaye - passion for Linux and security

DETAILS

* Location: Amsterdam, The Netherlands
* Nationality: Dutch
* Driving License: Car
* Birthyear: 1993

SYNOPSIS

rick [--soft-skills] [--hard-skills] [--education] [--experience] [--honours] [--certification] [--projects] [--leisure] [--other]

SUMMARY

I am an engineer with skills in networking, security, programming, and Linux. Because of my early involvement with IT, I have developed a broad skill-set; including a skill to quickly understand complex and new technologies. I have a passion for Linux and security in which I want to develop myself further in. My career goal is a security executive role within an international company as I am good in leading and working with people, and international environments energize me. I am open to job offers that help me achieve my goals and develop myself further.

SOFT SKILLS

* Problem-solving way of working with a logical and analytical approach
* Capable of adapting to target audience and public speaking
* Capable of priorizing and working under pressure
* Motivated and driven person who likes challanges
* Flexible and adaptable
* Self-improvement

HARD SKILLS

* Linux distributions like Debian, Arch, CentOS/RHEL and Ubuntu (Administration, Infrastructures, Deployment, and Open Source Projects)
* Security (HIPS, IPS/IDS, Firewalls, Anti-Virus, Endpoints, and System Hardening)
* Networking (Routing, Switching, and Wireless)
* Logging (SIEM, Syslog)
* Infrastructure Componments (DHCP, DNS, Proxies, DCs, and LDAP)
* Virtualization (XEN, VMware, and Hyper-V)
* Windows Server (Applications and Infrastructures)
* Forensics (Linux Systems and Network)
* Programming (Basic Web, Bash Shell Scripting, and Python)
* Penetration Testing (Kali, OpenVAS, Nessus, Metasploit)
* Cloud (AWS)

EDUCATION

[0] Master of Science in System and Network Engineering - University of Amsterdam [09/2016 - 02/2018 | Amsterdam, The Netherlands]

Master focused at Linux, networking, security, forensics, and cybercrime.

[1] Bachelor of Science in Information and Communications Technology - ZUYD University of Applied Sciences [02/2012 - 02/2016 | Heerlen, The Netherlands]

Bachelor focused at Linux, Windows, networking, security, and forensics.

[2] Minor in Computer Science - Dakota State University [01/2015 - 06/2015 | Madison, South Dakota, The United States]

Minor focused at JavaScript, HTML, C, and Visual Basic.

EXPERIENCE

[0] Developer Security Engineer - ABN AMRO Bank [09/2018 - present | Amsterdam, The Netherlands]

DevOps for IBM QRadar SIEM and other security solutions.

[1] Network Engineer - YaWorks (Schiphol Airport) [04/2018 - 08/2018 | Amsterdam, The Netherlands]

Set to work at Schiphol Telematics as Network Engineer to manage access layer. Also did Python programming for data analyzing.

[2] Network/Security Engineer - The Networkers [07/2016 - 12/2016 | Utrecht, The Netherlands]

Consultant for wireless and security projects (firewalls and IPSs).

[3] Intern System Engineer - Cisco Systems [09/2015 - 03/2016 | Amsterdam, The Netherlands]

Graduate research on how Cisco ASA/FP can be implemented in an Application Centric Infrastructure (ACI) and what its best practices are. The following Proof of Concepts were created for customers and the research:

* 2 ASA5515-X in cluster integrated with L4 to L7 Service Integration in ACI
* ASAv and FPv on an ESX host integrated with L4 to L7 Service Integration in ACI

Also gave demos at Cisco security events regarding FirePower and ACI.

[3] Network/Security Engineer - Open Line Consultancy (DSM) [07/2014 - 12/2014 | Maastricht Aachen Airport, The Netherlands]

Set to work at DSM as IT Security Officer. Was responsible for the Host Intrusion Prevention Systems, and supported with Threat Incident Management, IPSs, and Anti-Virus.


[4] Intern Network/Security Engineer - Open Line Consultancy (DSM) [01/2014 - 06/2014 | Maastricht Aachen Airport, The Netherlands]

Undergraduate research at DSM by Open Line on how to optimize the Host Intrusion Prevention Systems and reduce its false positives. The result of the research was a decrease of threat events by 99% in production.

HONOURS

[0] President's Honors List for Academic Achievement – President of Dakota State University [05/2015 | Dakota State University]

Honour based on my academic achievement during the Spring Semester on Dakota State. Achieved by having an average GPA of 3.8 (93%/A).

CERTIFICATION

[200-125] Cisco Certified Network Associate Routing & Switching (CCNA) [05/2018 - 05/2021 | Cisco]

PROJECTS

[0] SecureDNS - securedns.eu [2017 - present]

SecureDNS is a public and privacy safe DNS server that uses open and proven standards to secure DNS queries. SecureDNS has around 28 million hits a day and is used worldwide.

* Emercoin, Namecoin, and OpenNIC TLDs
* DNS over TLS/HTTPS/DNSCRYPT
* HaProxy and ICS Bind
* DNSSEC

[1] Thesis 2: How to Spot the Blue Team - University of Amsterdam/Outflank [2018]

Research with a Proof of Concept to detect a potential Blue Team's analysis of a Red Team's operation. This implementation exists out of Elastic Stack and Python scripts to detect anomalies in Command and Control communication and Virustotal.

* NGINX Reverse Proxy for TLS decryption
* Elasticsearch-DSL Python Module
* Powershell Empire
* Cobalt Strike
* Elastic Stack
* BIND ICS

[2] Course Project: Cloud File-Sharing Service Crawler - University of Amsterdam [2018]

Research with a Proof of Concept of a crawler that is able to detect cloud file-sharing services with use of fuzzy hashing, and decode its forensic artifacts. The crawler written in Python is able to detect and retrieve file records, sync/root folder, and username/email-address of OneDrive, Google Drive, iCloud Drive, and Dropbox.

* Context Triggered Piecewise Hashes (CTPH)/Fuzzy Hashing
* DPAPI and DPAPI-NG: Decryption Toolkit
* Python-Registry library
* SQLite3

[3] Thesis 1: Machine Learning-based Intrusion Detection System for Industrial Control Systems - University of Amsterdam/Deloitte [2017]

Research with a Proof of Concept of an Intrusion Detection System (IDS) that is able to detect anomalies by using Machine Learning in a Industrial Control System (Water Thermostatic Closed Loop Environment). The IDS runs on a Raspberry Pi and is able to operate on the lowest layers (between 0 and 1) of the control hierachy model of Purdue.

* Novelty and Outlier Detection Machine Learning (One-Class Support Vector Machine)
* Neural Network Machine Learning (Long Short Term Memory)

[4] Course Project: NTP as a Covert Channel - University of Amsterdam [2017]

A Proof of Concept of a tunnel with AES encryption over the Network Time Protocol (NTP). This implementation deemed 9 times faster than Iodine (DNS), and 128 times faster than Ptunnel (ICMP). Benchmarks were as following:

* No tunnel: 940 Mbps
* NTP Tunnel: 920 Mbps unencrypted
* NTP Tunnel: 360 Mbps AES encrypted
* Iodine: 100 Mbps
* Ptunnel: 7 Mbps

LEISURE

* Reading books and articles about technology, spychology, lifestyle and nutrition
* Sports: rockclimbing and fitness
* Dancing: salsa and bachata
* Travelling and being outside
* Learning/CTFs

OTHER

* SecureDNS: https://securedns.eu/
* Twitter: ricklahaye
* LinkedIn: https://www.linkedin.com/in/ricklahaye/
* Github: https://github.com/ricklahaye/

  RICK LAHAYE(25)                   05-09-2018                    RICK LAHAYE(25)