Search

Kurt D'Mello Phones & Addresses

  • Fairfax, VA
  • 4904 Mcfarland Dr, Fairfax, VA 22032

Work

Company: Freddie mac May 2019 Position: Application security, technician lead

Education

School / High School: Sim Center, Miami 2008

Skills

Unix • Java • Computer Security • Xml • Security • Sql • Vulnerability Assessment • Databases • Sdlc • Javascript • Linux • Java Enterprise Edition • C • Tomcat • Oracle • C++ • Cvs • Cissp • Aix • Software Development Life Cycle • Secure Code Review • Jsp • Tcp/Ip • Perl • Information Security • Javaserver Pages • Software Security • Static Analysis Deployment • Application Penetration Testing • Fortify Sca/Awb/Ssc • Secure Architecture Review • Appscan Standard • Burp Suite • Appscan Source • Vulnerability Management • Cloud Security • Jsse • Html • Powershell • Bash • Jsp Development • Icmp • Snmp • Performance Management • Java Applets • Semantic Technologies • Crew Resource Management • Ogc • Struts • Ejb

Languages

Hindi

Ranks

Certificate: Certified Ethical Hacker (Ceh)

Interests

Human Rights • Children • Environment • Poverty Alleviation

Industries

Computer & Network Security

Resumes

Resumes

Kurt D'Mello Photo 1

Application Security, Technician Lead

View page
Location:
Washington, DC
Industry:
Computer & Network Security
Work:
Freddie Mac
Application Security, Technician Lead

Synopsys Sep 2013 - May 2019
Senior Security Consultant

Sourcefire Jul 2013 - Sep 2013
Security Consultant Iii

Kingfisher Airlines Apr 2008 - May 2012
Airline Transport Pilot, First Officer Airbus A320

Image Matters Llc Nov 2004 - Aug 2005
Senior Software Engineer
Education:
Sim Center, Miami 2008
West Virginia University 1994 - 1996
Bachelors, Bachelor of Science, Computer Science
Northern Virginia Community College 1992 - 1994
Associates, Computer Science
St. Andrew's High School, Bandra (W), Mumbai
St. Andrew's High School, Bandra, Mumbai, India
St. Andrew's College
Skills:
Unix
Java
Computer Security
Xml
Security
Sql
Vulnerability Assessment
Databases
Sdlc
Javascript
Linux
Java Enterprise Edition
C
Tomcat
Oracle
C++
Cvs
Cissp
Aix
Software Development Life Cycle
Secure Code Review
Jsp
Tcp/Ip
Perl
Information Security
Javaserver Pages
Software Security
Static Analysis Deployment
Application Penetration Testing
Fortify Sca/Awb/Ssc
Secure Architecture Review
Appscan Standard
Burp Suite
Appscan Source
Vulnerability Management
Cloud Security
Jsse
Html
Powershell
Bash
Jsp Development
Icmp
Snmp
Performance Management
Java Applets
Semantic Technologies
Crew Resource Management
Ogc
Struts
Ejb
Interests:
Human Rights
Children
Environment
Poverty Alleviation
Languages:
Hindi
Certifications:
Certified Ethical Hacker (Ceh)
Certified Information Systems Security Professional (Cissp)
Certificate of Cloud Security Knowledge
Security+
Airline Transport Pilot
License 255116863
License 444680
License 423568539711
License 3225291
Ec-Council, License 255116863
International Information Systems Security Certification Consortium, License 444680
Cloud Security Alliance, License 423568539711
Comptia
Faa, License 3225291

Publications

Us Patents

Mapping Remediation To Plurality Of Vulnerabilities

View page
US Patent:
7774848, Aug 10, 2010
Filed:
Jul 23, 2004
Appl. No.:
10/897402
Inventors:
Kurt D'Mello - Fairfax VA, US
David Spencer Tyree - Centreville VA, US
Sudhir Gandhe - Fairfax VA, US
Assignee:
Fortinet, Inc. - Sunnyvale CA
International Classification:
G06F 11/10
G06F 12/14
G06F 12/16
G08B 23/00
US Classification:
726 25
Abstract:
A method of mapping a remediation to a plurality of vulnerabilities may include: assessing susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible; implementing the remediation upon the machine; assessing susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and creating a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets.

Determining Technology-Appropriate Remediation For Vulnerability

View page
US Patent:
8171555, May 1, 2012
Filed:
Jul 23, 2004
Appl. No.:
10/897399
Inventors:
Kurt D'Mello - Fairfax VA, US
David Spencer Tyree - Centreville VA, US
Eric David O'Brien - Leesburg VA, US
Sudhir Gandhe - Fairfax VA, US
Assignee:
Fortinet, Inc. - Sunnyvale CA
International Classification:
G06F 11/00
G06F 12/14
G06F 12/16
G08B 23/00
US Classification:
726 25
Abstract:
A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between: a RID field, the contents of which denote an identification (ID) of a remediation (RID); at least one TID field, the contents of which denotes an ID of at least two technologies (TIDs), respectively; and at least one ACTID field, the contents of which denotes an ID of an action (ACTID). A method, of selecting a remediation that is appropriate to a technology present on a machine to be remediated, may include: providing such a machine-actionable memory; and indexing into the memory using a given RID value and a given TID value to determine values of the at-least-one ACTID corresponding to the given RID value and appropriate to the given TID value.

Vulnerability-Based Remediation Selection

View page
US Patent:
8561197, Oct 15, 2013
Filed:
Apr 22, 2010
Appl. No.:
12/765431
Inventors:
Kurt D'Mello - Fairfax VA, US
David Spencer Tyree - Centreville VA, US
Sudhir Gandhe - Fairfax VA, US
Assignee:
Fortinet, Inc. - Sunnyvale CA
International Classification:
G06F 11/00
G06F 12/14
G06F 12/16
G08B 23/00
US Classification:
726 25
Abstract:
A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.

Determining Technology-Appropriate Remediation For Vulnerability

View page
US Patent:
8635702, Jan 21, 2014
Filed:
Apr 4, 2012
Appl. No.:
13/439385
Inventors:
Kurt D'Mello - Fairfax VA, US
David Spencer Tyree - Centreville VA, US
Sudhir Gandhe - Fairfax VA, US
Eric David O'Brien - Leesburg VA, US
Assignee:
Fortinet, inc. - Sunnyvale CA
International Classification:
G06F 11/00
G06F 12/14
G06F 12/16
G08B 23/00
US Classification:
726 25
Abstract:
A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between: a RID field, the contents of which denote an identification (ID) of a remediation (RID); at least one TID field, the contents of which denotes an ID of at least two technologies (TIDs), respectively; and at least one ACTID field, the contents of which denotes an ID of an action (ACTID). A method, of selecting a remediation that is appropriate to a technology present on a machine to be remediated, may include: providing such a machine-actionable memory; and indexing into the memory using a given RID value and a given TID value to determine values of the at-least-one ACTID corresponding to the given RID value and appropriate to the given TID value.

Data Structure For Vulnerability-Based Remediation Selection

View page
US Patent:
20060021053, Jan 26, 2006
Filed:
Sep 20, 2004
Appl. No.:
10/944406
Inventors:
Kurt D'Mello - Fairfax VA, US
David Tyree - Centreville VA, US
Eric O'Brien - Leesburg VA, US
Sudhir Gandhe - Fairfax VA, US
International Classification:
G06F 11/00
US Classification:
726025000
Abstract:
A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.
Kurt Dave D'Mello from Fairfax, VA, age ~51 Get Report