Steve Miller is an incident response professional and principal researcher for FireEye. Steve is experienced in the broader security and IT industries in areas such as computer forensics, communications signals analysis and intelligence program management.
Steve joined Mandiant in early 2013 as a threat analyst and continues his work in FireEye in studying adversary methodologies, aiding incident response activities, and generally finding evil.
Prior to joining Mandiant, Steve conducted research and special projects for federal government agencies like the U.S. Department of Homeland Security and the U.S. Department of State. His work in these organizations included the development of new ways to perform tailored evidence collection for use in law enforcement investigations. Steve’s other research includes the design and management of security emergency exercises including a simulated international manhunt called the TAG Challenge, the results of which are now published in the Public Library of Science.
Steve began his career in security working with the U.S. Army Intelligence and Security Command at the National Security Agency. In this role, Steve conducted signals intelligence operations in direct support of U.S. counterterrorism operations in Iraq and Afghanistan.
Steve holds a Bachelor of Science in Computer and Digital Forensics from Champlain College in Vermont. In his spare time, he likes to ride his totally rad BMW F800GS motorcycle.
AKA: Millers Crossing The S4 Debates have become popular and this is a great followup from last years OT SOC or Enterprise SOC debate. Question: Are Specialized OT Tools and Talent Required to Detect Attacks on ICS? Arguing the Positive / Yes specialized OT tools and talent are required: Ben Miller of Dragos Arguing the Negative […]