Evan Burton, PE
Details
Electrical Engineering
The University of Memphis
2009
MS | Master of Science
Cyber Security
New York University
- Conduct regular vulnerability scans to identify any security holes
- Develop and monitor intrusion detection/prevention systems
- Conduct authentication and security authorization process
- Analyze network and system logs for suspicious or malicious activity
- Provide technical support and advice in cyber security
- Develop and deploy custom solutions using Python to address complex work challenges
- Monitor for, analyze, and respond to cyber security threats and incidents
- Implement and enforce data privacy and security policies
- Maintain records of data security incidents, including any regulatory violations
2023 : Present
A1 Engineering & Cyber
Information Security Engineer
2022 : 2023
FORTNA
Commissioning Engineer I
Creates proposals and produces estimates and front-end engineering design for customers.
• Performs Factory Acceptance Tests (FAT) / hardware & software commissioning for electrical car seat tester customers (Toyota, GMC, Ford, etc.).
• Modifies/supports field PLC hardware changes and software programs (RSLogix500, Studio5000).
• Supports Visual Basic .NET framework hardware and provides software field support for proprietary software programs created by Altron Automation.
2020 : 2022
Altron Automation
Field Service Engineer
Served in a Project Management capacity providing scope development, specifications review, and cost/schedule management.
2019 : 2020
Innovative Engineering Services Pvt- IES
Electrical Engineer
Served in a Project Management capacity providing scope development, specifications review, and cost/schedule management.
2017 : 2019
View, Inc.
Electrical Controls Engineer
Skills
Cloud Security, Cryptography, Cyber Threat Hunting (CTH), Cyber Threat Intelligence (CTI), Data Privacy and Protection, Disaster Recovery, DLP, Encryption Technologies, Endpoint Security, Firewall Management, Forensic Analysis, Forensic Tools and Techniques, Identity and Access Management (IAM), Incident Response, Information Security Management System (ISMS), Intrusion Detection, Intrusion Prevention Systems, IT Governance and Compliance, IT Security Assessments, IT Security Policies & Procedures, Log Analysis, Malware Analysis, Network Protocol Analysis, Network Security, Network Security Auditing, Network Segmentation, Network Traffic Analysis, Patch Management, Penetration Testing, Physical Security, Risk Assessment, RSA Security, Secure Coding Practices, Secure Network Design, Secure Software Development Life Cycle, Secure Systems Administration, Security Architecture Design, Security Assessments and Audits, Security Awareness Campaigns, Security Awareness Training, Security Compliance, Security Incident & Event Management, Security Incident Reporting, Security Incident Response Automation, Security Information and Event Management (SIEM), Security Monitoring, Security Operations Center, Vulnerability Assessment, Web Application Security, Wireless Network Security, Analysis, Customer Service, Electrical Engineering, Linux, Matlab, Microcontrollers, Microsoft Word, PCB design, Power Distribution, Power Systems, Process Improvement, PowerPoint, Project Management, SCADA, Pspice, Troubleshooting, Visual Basic, Team Leadership, Delta V
About
Seasoned, highly skilled IT Security Professional known for a hands-on approach, a keen eye for detail, and always striving for perfection. Highly skilled in the planning and development of enterprise information cybersecurity strategy and best practices in support of the information security architecture. Serves as a subject matter expert on best practices for cyber system and data integrity, availability, confidentiality, accountability, and assurance. Oversees Information Security and recommends investments that mitigate overall cybersecurity risks, strengthen defenses, and reduce vulnerabilities for development, internal and client-facing systems. Ability to work within any time zone..
• Documents and leads the implementation of technical features, improvements and innovations.
• Understands client needs for a safe cyber network
• Known for agile engineering capabilities and a design-thinking mindset
• Works cross-functionally to define and execute on projects.
• Highly knowledgeable in best engineering practices, tools and development patterns.
• Takes ownership of highly complex workflows.
• Upholds high engineering standards and brings consistency to network defenses.
• Manages priorities effectively; drives multiple projects forward in parallel.
COMPETENCIES:
Agile Methodologies • Backend Engineering • Best Practice Sharing • Code Reviews • Containerization • Cross-functional Collaboration • Debugging • Developing on Cloud Infrastructure. • Excellent Verbal & Written Communication Skills • Front-end Engineering Design (FEED) • Internal Frameworks • Layered Solutions & Designs • Microservices • Mobile Apps • Modern APIs • Performance Scaling • Product Development • Project Management • Root Cause Analysis • SaaS • Scope Development • Software Delivery • Software Development Life Cycle (SDLC) • System Architecture • System Integration • Team Leadership • Technical Documentation Testing • Troubleshooting • Web Apps • Web Data Extraction • Web Scraping
TECHNICAL / LANGUAGE / SERVICE / SOFTWARE / PLATFORM PROFICIENCIES:
APIs • Arc Flash • AutoCAD • AWS (Basics) • AWS Lambda • C# • Celery • Cisco • DeltaV • Discord • Django Docker • DynamoDB • ElasticSearch • ETAP • FTP • Golang • GraphQL • IMAP4 • JavaScript • JunOS • MATLAB Maximo • Microsoft Office • MongoDB • MySQL •.NET • NoSQL Databases • Postgres • Python RDBMS • React • Redis & Queues • REST (FastAPI) • REVIT • SaaS • SKM • SMTP • SSH • SSL • TCP/IP • Telegram • TELNET Twitch • Visual Studio • Wonderware