About
Disclaimer: The information expressed is of my personal experiences and opinions and does…
Articles by Brad
Activity
19K followers
Experience
-
Confidential
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
-
Wilmington University
3.78
-
Activities and Societies: Dean's List Fall 2022, Dean's List Spring 2023, Dean's List Fall 2023
-
-
-
-
-
-
-
-
-
-
-
Licenses & Certifications
Volunteer Experience
-
-
-
Professional Development Mentor
Cyber Mentor DoJo
- Present 4 years 4 months
Education
I provide mentorship and professional development services at Cyber Mentor Dojo.
-
Information Technology & Security Mentor
None
- Present 16 years
Science and Technology
I often am approached by future I.T. Professionals that would like to discuss certification, career alignment, and recommendation. I volunteer my time to anyone who would like to discuss my experiences and help to establish career goals in I.T./S. Feel free to reach out to me via LinkedIn to discuss.
-
Public Speaker
InfraGard Houston Members Alliance
- 1 month
Science and Technology
https://github.com/bvoris/InfraGardPresentation
-
Zero Trust Training Expert
Cloud Security Alliance
- 6 months
Science and Technology
Provide expertise to the Cloud Security Alliance for the development of training and exam questions.
-
Education Adviser
Trilogy Education
- 6 months
Education
Cyber and information security education adviser
-
Student Web Developer
Stafford High School
- 1 year 3 months
Develop initial web site for Stafford High School in collaboration with other Stafford High School Students
Publications
-
VPNFilter: The more you know
Originally Peerlyst now converted Google Doc
See publicationEasy to understand overview of VPNFilter Router & NAS Malware
-
A Comparison of Different Online Password Vault/Manager Software Options
Originally Peerlyst now LinkedIn
See publicationA Comparison of Different Online Password Vault/Manager Software Options
-
Bypass some form submittal requirements to download content
See publicationBypass some form submittal requirements to download content
-
Essentials of Cybersecurity
Peerlyst
See publicationChapter 8 Understanding Central Areas of Enterprise Defense
By Brad Voris -
My Experience migrating from Windows 2003 to Windows 2012 R2 enterprise multi-site single forest domain:
Microsoft
See publicationMy guided walk through of my experiences migrating from Windows 2003 - Windows 2012 R2 enterprise multi-site single forest domain.
-
Common problems when configuring DHCP High Availability Clustering in Windows 2012 R2
Microsoft
See publicationLast month I completed a full implementation of Windows 2012 R2 DHCP High Availability at an enterprise organization.
12 sites with DHCP High Availability Clustering was very straight forward to setup and document. In this article are several common problems I ran into configuring DHCP High Availability Clustering. -
Configuring Carlson Software Network Licensing on Redundant Server Pool
Carlson Software
See publicationDetailed documentation for configuring redundant server licensing pool for Carlson Software. Originally published 8-31-2006 for Jones & Carter, Inc. and Carlson Software.
Patents
-
Germicidal LED Ultra Violet C Light Switch attachment for Hospitals
Filed US 63/068835
Courses
-
Acknowledgement: Solutions Summit - A Secure Future in the Cloud
-
-
CISSP - Accelerated Learning Program
-
-
Cisco Cybersecurity Program: Understanding Cisco Cybersecurity Fundamentals
-
-
Cloud Computing Security
-
-
DNSSEC Training Workshop
-
-
Endpoint Detection and Response - The Final Frontier: Why EDR is essential to your security operations
-
-
FOR508 - Advanced Incident Response and Threat Hunting
-
-
Fortinet NSE 1 - Network Security Technology Foundations
-
-
Hardening Microservices Security Building a Layered Defense Strategy
-
-
ISC2 - Moving to the Cloud
-
-
ISC2 - Securing Containers at the Speed of DevOps
-
-
Introduction to CyberArk Privileged Access Security Course
-
-
LAN Security Using Switch Feature
-
-
LinkedIn CISM Certification Preperation
-
-
NERC CIP v5 Training
-
-
Radio Frequency Identification (RFID) Security
-
-
SANS Analyzing Encrypted Networks
-
-
SANS CloudSec Summit 2021
-
-
SANS CloudSec Summit 2021
-
-
SANS DFIR Summit 2021
-
-
SANS Effective Measures of Defense
-
-
SANS Endpoint Detection and Reponse
-
-
SANS FOR508: Advanced Incident Response and Threat Hunting Course
-
-
SANS Hardening Microservices Security
-
-
SANS Implementing and Maintaining a DevSecOps Approach in the Cloud
-
-
SANS Internet of Evil Things
-
-
SANS Purple Team Summit & Training 2021
-
-
Securing Infrastructure Devices
-
-
Securing the Network Perimeter
-
-
Security and DNS
-
-
The Internet of Evil Things - How to Detect and secure your vulnerable devices from Mirai Botnet
-
-
The Internet of Evil Things - How to Detect and secure your vulnerable devices from Mirai Botnet
-
-
Top Methods Pen Testers Use to Socially Engineer Their Way In
-
-
VMware vSphere 5.5: Installation, Configuration and Management
-
Projects
-
OSINTProfiler - Social Engineering Target Profile Generator
See projectThis tool gathers information from the end user about a specific target. First name, last/surname, location, etc. are gathered to generate a list and scrape specific websites to gather additional information about the target. This is a reconnaissance tool that can be used by red teams to help facilitate penetration testing through social engineering.
-
Github Repository
- Present
See projectAll future projects will be stored and available in my Github Repository.
-
HOU.SEC.CON Presentation on MITRE ATT&CK Framework Threat Modeling
-
-
PSNetMon - Powershell Network Monitoring Utility
-
See projectOngoing effort to develop an easy to manage infrastructure monitoring and reporting system completely driven by Microsoft Powershell. Light weight and robust with a very intuitive design.
This has been my pet project for the last couple of years, completely open to the public for modification. -
PowerShell Webserver Security Report
-
See projectPowerShell Webserver Security Report
I am not responsible for how you use this! Use this at your own risk!
Performs the following tests on a webserver
Validates if TCP ports 21, 22, 53, 80, 443, 8080
Gets HTTP Response Headers
Gets Certificate information
Gets robots.txt data
Gets sitemap.xml data
Gets crossdomain.xml data
Gets input fields names, types, ids and maxlength
Validates if vulnerable URLs exist and are accessible to the…PowerShell Webserver Security Report
I am not responsible for how you use this! Use this at your own risk!
Performs the following tests on a webserver
Validates if TCP ports 21, 22, 53, 80, 443, 8080
Gets HTTP Response Headers
Gets Certificate information
Gets robots.txt data
Gets sitemap.xml data
Gets crossdomain.xml data
Gets input fields names, types, ids and maxlength
Validates if vulnerable URLs exist and are accessible to the internet
Generates a report located here:
C:\temp\PoSh-Security-Report-$URL.html -
HTA Arbitrary Code Execution Framework
-
See projectFramework for a Hypertext Application designed to execute arbitrary code.
-
Raspberry Pi Zeek Network Security Monitor
-
See projectWorking documentation and code for Raspberry Pi Zeek Network Security Monitor Deployment
-
Red Team Recon
-
See projectRed Team Reconnaissance Tool for Windows systems
Red Team Recon is a red team tool to be run on Windows Systems for reconnaissance gathering
This tool will require escalated privileges
To be used for demonstration purposes only
RedTeamRecon will gather the following information:
Hostname, OS information, BIOS, physical hardware, recent hotfixes, local users and groups, local privilege information, complete network information (interfaces, IP v4/v6 stack…Red Team Reconnaissance Tool for Windows systems
Red Team Recon is a red team tool to be run on Windows Systems for reconnaissance gathering
This tool will require escalated privileges
To be used for demonstration purposes only
RedTeamRecon will gather the following information:
Hostname, OS information, BIOS, physical hardware, recent hotfixes, local users and groups, local privilege information, complete network information (interfaces, IP v4/v6 stack, routes, active connections) WiFi profiles (profile name, SSID, Connection, Encryption, Pre-Shared Keys), Current running Processes, writable directory information, local firewall profiles, local share information, any locally stored clear-text credential strings.
-
Active Directory Reports v. 1.0 - PowerShell Web Development Project
-
PowerShell driven reports website that generates reports based on Active Directory events.
Features:
Privileged Access Groups Report - monitor privileged access groups in AD for changes
Account Lockout Report - monitor AD for account lockouts
Password Compliance Report - monitor AD for user accounts out of password compliance
Last Logon 180 Days Report - monitor AD for users that have not logged on for 180 days or greater
Group Membership Report - monitor changes in all group…PowerShell driven reports website that generates reports based on Active Directory events.
Features:
Privileged Access Groups Report - monitor privileged access groups in AD for changes
Account Lockout Report - monitor AD for account lockouts
Password Compliance Report - monitor AD for user accounts out of password compliance
Last Logon 180 Days Report - monitor AD for users that have not logged on for 180 days or greater
Group Membership Report - monitor changes in all group memberships
Active Users Report - monitor machines for active users (WIP uses third party plugin)
Active Directory Health Report - monitors replication status and health of Active Directory
DNS Health Report - monitors replication and health of DNS
Group Policy Backup - backup a view-able copy of all Group Policy Objects for review
https://github.com/bvoris/ActiveDirectoryReports -
AbuseIPDBChecker
-
See projectPowerShell script to query an IP address against AbuseIPDB and get the results of that query. This will help quickly determine if an IP address is in their abuse database.
-
United Airlines Server Naming Tool
-
Created a web based application using HTML and JavaScript that generates server names based on United Airlines Systems Naming Standard. This tool is used by United IPMO design engineers to generate server names for design proposal summaries and system engineering work orders.
-
United Airlines - Application Service Block for United Airlines In-flight WiFi Portal
-
Design and develop ground service servers for United Airlines in-flight wifi portal.
Design includes development, quality assurance, and production infrastructure virtual environments that replicated between data centers. -
Automated Report Systems
-
Built automated report systems from Powershell scripting based on business requirements.
AD Health Report - Active Directory health report in HTML format sent weekly via email.
DNS Health Report - DNS health report that is ran on an as needed basis sent via email.
SOX Compliance User Security Audit Report - SOX Compliant user security report that is ran on an as needed basis for for audit purposes. Audit report produces either HTML or excel format of Active Directory user database…Built automated report systems from Powershell scripting based on business requirements.
AD Health Report - Active Directory health report in HTML format sent weekly via email.
DNS Health Report - DNS health report that is ran on an as needed basis sent via email.
SOX Compliance User Security Audit Report - SOX Compliant user security report that is ran on an as needed basis for for audit purposes. Audit report produces either HTML or excel format of Active Directory user database information required for business auditing. -
DHCP High Availability in Windows 2012 R2
-
Designed, tested and implemented enterprise wide DHCP HA in Windows 2012R2.
DHCP HA at all sites with multiple DHCP servers and backed up via PowerShell to a core site.
Common problems when implementing DHCP High Availability in Windows 2012 R2 have been documented and uploaded to Technet this link:
http://social.technet.microsoft.com/wiki/contents/articles/31486.common-problems-when-configuring-dhcp-high-availability.aspx -
Distributed File System - DFS
-
Built new DFS Namespace and root servers
Migrated old file servers to new DFS servers
Managed DFS replication between sites with bandwidth constraints -
Active Directory 2003 to 2012 R2 Migration
-
Evaluate existing environment with engineers
Determine plan of action
Check for any existing problems within Active Directory, services, and resources that require LDAP
Deploy physical and virtual Windows 2012 R2 servers to sites
Promote Windows 2012 R2 Servers to Domain Controllers
Validate replication of Windows 2012 R2 servers
Migrate DNS using Powershell on all Windows hosts that have static DNS
Migrate DHCP service to new Domain Controllers
Setup DHCP High…Evaluate existing environment with engineers
Determine plan of action
Check for any existing problems within Active Directory, services, and resources that require LDAP
Deploy physical and virtual Windows 2012 R2 servers to sites
Promote Windows 2012 R2 Servers to Domain Controllers
Validate replication of Windows 2012 R2 servers
Migrate DNS using Powershell on all Windows hosts that have static DNS
Migrate DHCP service to new Domain Controllers
Setup DHCP High Availability
Move FSMO roles to virtual 2012 R2 server
Demote existing Windows 2003 Domain Controllers to member servers
Clean up additional services on 2003 domain controllers
Decommission Windows 2003 servers
Validate replication of Windows 2012 R2 servers
Raise Forest/Domain functional level
Validate replication
-
Build Active Directory and Exchange testing environment
-
Scope: Build servers in VMware virtual environment for testing and development
Build Windows 2003 domain controllers
Build Exchange 2003 email server
Build Windows 2008 R2 domain controllers and migrate domain (parent and child domains)
Build Exchange 2010 email server, migrate users from Exchange 2003
-
Microsoft Hyper-V Setup and Configuration
-
Setting up new Hyper-V VM for use as a Windows 2003 server. This server will be configured as an Act DB server on a Windows 2008 R2 server.
-
Microsoft Exchange Server 2010 Setup and Configuration
-
-
Enterprise Phone System Migration
-
With the assistance of Genesis BCS we migrated out of Iwatsu phone systems at all 10+ locations to Shoretel VOIP phone systems and phones.
This included migrating from old layer 2 to layer 3 switches and configuring QoS for voice traffic. -
Firewall Migration
-
Existing infrastructure had expired Sonic Walls. I migrated out the Sonic Wall firewalls to Fortinet Fortigates. These were the most cost effective solution for Cherry and allowed for more flexibility and future expansion/growth.
-
Cisco gigabit network migration
-
Migrate from existing Intel 5xx series and 3Com 10/100 switches to Cisco 10/100/1000 gigabit switches with fiber SFP modules
Work with local vendors, budget and purchase equipment
Configure switches (IP, VLAN, SNMP)
Deploy switches
Honors & Awards
-
2012 Worldwide Brainbench Games Technical Help Desk Winner
Brainbench
2012 Worldwide Brainbench Games Technical Help Desk Winner
Link:
http://www.brainbench.com/xml/bb/landing/offer/promotion.xml?contentId=2944
Test Scores
-
Cisco Global Cybersecurity Scholarship Pre-Qualification Assessment
Score: 87.22
https://drive.google.com/open?id=0ByDtQqtvIl3kN2pQSWNEeVJvYU0
Languages
-
Spanish
Limited working proficiency
-
French
Elementary proficiency
-
English
Native or bilingual proficiency
-
Russian
Elementary proficiency
Organizations
-
Order of the Sword & Shield National Honor Society
Member
- PresentThe Order of the Sword & Shield (Omicron Sigma Sigma) is a national honor society for students and professionals in homeland security, emergency management, and related protective security fields, founded in 2010 to promote scholarship, ethics, and professional development within these disciplines. The society's motto is ex scientia pax ("out of knowledge comes peace"). It offers academic recognition, networking opportunities, and financial aid to its members.
-
Cloud Security Alliance
Member
- PresentCloud Security Alliance is a not-for-profit organization with a mission to “promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.”
-
ISACA - Information Systems Audit and Control Association
Member ID: 1004192
- PresentISACA is an international professional association focused on IT governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only.
-
SANS
Member ID: 5633967
- PresentThe SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and audit.
-
InfraGard
Member #10102028
- PresentInfraGard is a non-profit organization serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation. The organization is an information sharing and analysis effort serving the interests, and combining the knowledge base of, a wide range of private sector and government members. InfraGard is an association of individuals that facilitates information sharing and intelligence between businesses, academic institutions, state and local law enforcement…
InfraGard is a non-profit organization serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation. The organization is an information sharing and analysis effort serving the interests, and combining the knowledge base of, a wide range of private sector and government members. InfraGard is an association of individuals that facilitates information sharing and intelligence between businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to prevent hostile acts against the United States. InfraGard's mutual nondisclosure agreements among its members (individuals) and the FBI promotes trusted discussions of vulnerabilities and solutions that companies and individuals may be hesitant to place in the public domain and provide access to additional threat information from the FBI.
-
ISC2 - Information System Security Certification Consortium, Inc.
Member ID: 554726
- Present -
I.E.E.E. - Institute of Electrical and Electronics Engineers
Member ID: 90864523
- Present -
I.E.E.E. Computer Society
Member
- Present -
ASCAP - American Society of Composers, Authors and Publishers
Member
American Society of Composers Authors & Publishers
-
HABA - Houston Area Blacksmith Association
Member
-
Internet Society
Member
-
Microsoft Technet
Member ID: Brad_Voris
https://social.technet.microsoft.com/profile/brad_voris/
Recommendations received
6 people have recommended Brad
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content