Matthew Rosentrater
Details
Computer Engineering
Regis University
1999 : 2003
With my deep expertise in cyber risk management and my ability to stay current on the latest threats and trends, I help organizations build a strong cybersecurity foundation that protects their assets, data, and reputation.
2019 : Present
Janus Henderson Investors U.S.
Master Cybersecurity Consultant
I opened my own business in 2009 to allow me to further pursue my passion for helping others and expand my skill scope in Data Security Incident Response and Management and Data Forensics.
Incident response involves containing, stopping, and preventing a cyberattack. While forensics is a specialized field focused on identifying, remediating, and investigating cybersecurity incidents.
I have since worked with several companies that had the misfortune of being breached, held for ransom or fell victim to internal cyber-attacks.
Although these are unfortunate circumstances, I have enjoyed the work that goes into stopping the attack, getting the business back to a steady state, and providing evidence to press charges against the criminals in a court of law.
2009 :
Tekkis
Managed Security Services / Incident Response / Forensics
Worked with the director of Internal Audit as a cybersecurity expert. My role was to identify shortcomings with internal controls, testing those controls, and providing actionable next steps. I assisted with audits against frameworks including SOC 2, NIST CSF, ISO 27001, CIS, and more.
2015 : 2018
Ball Aerospace
Senior Cyber Security Consultant
2011 : 2013
MillerCoors
Cyber Security Consultant
2009 : 2011
Molson Coors
Cyber Security Consultant
Skills
Active Directory, AIX, Architecture, Architectures, Citrix, Cloud Computing, Clustering, Computer Hardware, Consolidation, Cybersecurity, Data Center, DHCP, Disaster Recovery, DNS, Enterprise Architecture, Ethical Hacking, Firewalls, High Availability, HIPAA, IBM AIX, Incident Response, Integration, Linux, Network Administration, Networking, Network Security, Operating Systems, Penetration Testing, Regulatory Compliance, SAN, Security, Server Architecture, Servers, SharePoint, Storage, Storage Area Networks, System Administration, Systems Engineering, TCP/IP, Troubleshooting, Unix, Virtualization, VMware, VMware ESX, VMware Infrastructure, vSphere, Windows, Windows Server, Windows Server 2003, Windows Server 2008
About
A triple threat for any organization. I have 30 years of experience as a Cybersecurity Expert and Network Security Consultant specializing in cybersecurity architecture, operations, compliance/audit readiness, vulnerability scanning/pen testing, ethical hacking, incident response, disaster recovery, and forensics.
With my extensive expertise in cyber risk management and my ability to stay current on the latest threats and trends, I help organizations build a strong cybersecurity foundation that protects their assets, data, and reputation.