Sean O’Connor has predominately worked in the Intelligence Community (IC), starting his career, like many do, in the US military, where he worked in various intelligence disciplines, ranging from Human Intelligence (HUMINT) to tactical Signals Intelligence (SIGINT), and later serving as a Counterintelligence (CI) contractor for the Department of Defense (DoD).
Sean has always been passionate about all things intelligence and all things cyber. With this combined passion, Sean decided after his third tour in Afghanistan, to transition to the private sector as a Cyber Threat Intelligence (CTI) researcher for Dell Secureworks in the exclusive Counter Threat Unit (CTU). “The intelligence training and experience I obtained throughout my military career and in the DoD gave me the tools necessary to build the CTU’s first ever virtual HUMINT team.” By applying traditional HUMINT tradecraft through sock puppet accounts, the CTU vHUMINT team was able to infiltrate dark web cybercriminal networks for the purpose of collecting, analyzing and producing intelligence.
After six years in the Secureworks CTU, Sean took on a new opportunity with KPMG US as their head of Threat Intelligence, where he built the CTI program for the US, LATAM, and Israel member firms. Fast forward to today, Sean is the Global Head of the Equinix Threat Analysis Center (ETAC), which is comprised of teams focused on threat intelligence research, threat hunting, consulting services and data analytics.
With an extensive background spanning 15 years in security leadership, Sean O’Connor stands as a distinguished expert. As both an accomplished author and dedicated educator, he imparts his knowledge with passion. Sean’s influential speaking engagements resonate widely, and his perspectives often find a place in media narratives, further solidifying his reputation in the field.
I’m on my way to SLEUTHCON baby! 😎
https://www.sleuthcon.com/willthomas
Full speaker line up here: https://www.sleuthcon.com/speakers
#Sleuthcon #Cybercrime #CTI
#CertiKInsight 🚨
We have seen an exploit on contract named MinterProxyV2 on BSC
Revoke permissions to 0x80a0D7A6FD2A22982Ce282933b384568E5c852bF
In total, ~$716k worth of tokens have been stolen
Victim contract has now been paused
RT @BushidoToken: First ever #FOR589 run this week! Let’s go 🔥
Interested in Having a Chat? Schedule a consultation.
Let's Talk