Since 2006, Jim Clausing has been working in GIAC. This expert is a qualified Board of Directors with over 25 years of work experience. According to Jim's resume and work profile, Jim Clausing has worked at more than four companies with diverse backgrounds and got various skills. Jim attended school at the The Ohio State University from 1987 to 1988. Jim Clausing has professional certification in License 64 and License 25. Jim can be found in Pickerington, Ohio – where the professional currently lives. You can search for Jim Clausing's phone number and email. We can also provide you additional contact information upon request.
Name variants:
James Clausing
Last updated May 24, 2024
Contact Information
Last Update
Jul 11, 2022
Email
jc**@giac.org, ji**@acm.org, cl**@computer.org
Location
Pickerington, OH
Company
Workplace

Colleagues
Work History
StaySharp/Community SANS Instructor and Local Mentor
Teaching a wide variety classes ranging from Packet Analysis and First Responder classes to Reverse Engineering Malware and CISSP prep. Mentoring the Intrusion Detection, Firewall, and most...
from Apr 2003
Technical Consultant, Network Security Architect
Primarily malware analysis and botnet tracking
from Mar 2000
Education
Jan 1987 — Aug 1988
Sep 1985 — Dec 1986
1980 — 1983
1977 — 1980
Occupations
Executive
Board Member
Security
Professor
Instructor
Pedagogue
Counselor
IT Professional
Computer Security Specialist
Management Team Executive
Operations Manager
Advisor
Security and Investigations Professional
IT Security
Skills
Firewalls
Network Security
Intrusion Detection
Computer Forensics
Malware Analysis
Computer Security
Cissp
Penetration Testing
Security
Information Security
Networking
Vulnerability Assessment
Linux
Information Security Management
Vulnerability Management
Network Architecture
Tcp/Ip
Sniffer
Ids
Incident Response
Network Forensics
Ips
Freebsd
Checkpoint
Web Application Security
Internet Protocol Suite
Vpn
Network Design
Routing
Virtual Private Network
Perl
Security Awareness
Reverse Engineering
Security Audits
Application Security
Encryption
Security Architecture Design