About The Security Blogger


– Joseph Muniz –

Joseph Muniz is a consultant at Cisco Systems and security researcher. Joseph started his career in software development and later managed networks as a contracted technical resource. He moved into consulting and found a passion for security while meeting with a variety of customers.

Joseph has been involved with the design and implementation of multiple projects ranging from Fortune 500 corporations to large federal networks. He is the author and contributor of several books as well as has spoken for popular security conferences such as RSA Europe, ISC2 and DEF CON. Joseph’s current role gives him visibility into the latest trends in cyber security both from leading vendors and customers.

—– Publications —–

SOC_BookPenTestingRas1KaliLinux_Pentest_ Book

                                    Author: Security Operations Center: Building, Operating and Maintaining your SOC – November 2015 Cisco Press – Purchase HERE / Amazon HERE
Author: Penetration Testing with Raspberry Pi – January 2015 Packt publishing – Purchase HERE / Amazon HERE / Barnes & Noble HERE
Author: Web Penetration Testing with Kali Linux – August 2013 Packt publishing – Purchase HERE / Amazon HERE / Barnes & Noble HERE

Article: Launching Social Media Based Attack – PenTest Magazine, November 2013
Article: Compromising Passwords w/ Kali Linux – PenTest Magazine, July 2013
Reviewer: Kali Linux Social Engineering – Packt Publishing, December 2013
Reviewer: Instant XenMobile MDM – Packt Publishing, September 2013
Reviewer: Citrix XenMobile Mobile Device Management – Packt Pub, February 2014
Reviewer: Getting Started With XenDesktop 7.x – Packt Pub, April 2014
Reviewer: Kali Linux CTF Blueprints – Packt Pub, August 2014 



I hold many certifications to include:

Certified Information Systems Security Professional CISSP
EC-Council Certified Ethical Hacker CEH
EC-Council Certified Security Analyst ECSA
EC-Council Certified Computer Hacking Forensic Investigator CHFI
Certified Penetration Tester IACRB
Cisco Certified Design Associate CCDA
Cisco Certified Network Associate CCNA
Cisco Certified Design Professional CCDP
Cisco Certified Network Professional CCNP
Cisco Certified Network Professional Security CCNP-Security
Cisco Certified Security Professional CCSP
Cisco Certified Voice Professional CCVP
Cisco Firewall specialist
Cisco IPS Specialist
Cisco Information Security Specialist
Cisco Advance Wireless Design Specialist
Cisco Advanced Security Field Specialist
Cisco IP Communications Support Specialist
Cisco Identity Services Engine Certified
SourceFire Certified Professional (SFCP)
SourceFire Certified Professional (SFCP-AMP)
Symantec Data Loss Prevention
Symantec PGP Endpoint Encryption
Symantec SSE PGP File Encryption
Altiris Client Management Suite and Server Management Suite
Symantec Network Admission Control
RSA DLP Suite Certified Systems Engineer CSE
RSA enVision Certified Systems Engineer CSE
RSA SecurID Certified Systems Engineer CSE
RSA Archer Certified Administrator CA
Routing and Switching Solutions for Systems Engineers
Information Systems Security (INFOSEC) professional
NetWitness SE Certification
McAfee Technical Professional Data Protection
McAfee Technical Professional Network Defense
McAfee Technical Professional Risk & Compliance
McAfee Technical Professional Web and Email security
McAfee Technical Professional System Security
F5 Technical Sales Accreditation
Certified Meraki Networking Associate
Specialties: TCP/ IP, Routing/Switch (OSPF, BGP, EIGRP, Frame Relay, etc), Cisco Core, Distribution and Access Layer Network Technologies, ASA / PIX / VPN Concentrators, NAC appliance / ISE, SNAC, SIEM technologies (CS-MARS, enVision, Accelops, Splunk), Iron Port (ESA / WSA) CSM, Beacon / Profiler, NCM (HP/ Voyence), Cisco Prime, Cisco LAN manager, Symantec / RSA DLP, End Point Security / Management solutions (SEP, Bigfix Altiris, etc), Encryption / Data at rest,  IPS/IDS, LAN / WAN networks, VoIP (Call Manager, Unity, IPCC, Gateways, SpanLink etc)
Contact: funktribe@gmail.com or jomuniz@cisco.com


http://www.thesecurityblogger.com does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed,purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein. Everything on this blog is based on personal opinion and should be interoperated as such.


VN:F [1.9.22_1171]
Rating: 4.8/5 (5 votes cast)
About The Security Blogger, 4.8 out of 5 based on 5 ratings

19 thoughts on “About The Security Blogger

  1. Pingback: Gemalto | Enterprise Security | Are we seeing the death of the password?

  2. Dear Joey Muniz
    I decided to write to you directly. I’m editor of Pentest Magazine. This magazine is special edytion for englishlanguage market. It is devoted to IT security, firewalls penetration tests, data security. I am looking for experts on this subject to build good mark of our magazine. We want to promote competent people which keep up on this fastgrowing feld. I would like to propose You writeing an article for our magazine. Choseing a subject is up to You, it may be your actual projects, something theoretical or practical, actual dengers or actual tendencies. We don’t pay for articles. We offer comertial of company on one page, information about author in inprint. Of course author will recieve magazin with article for free.
    I hope you will concider my proposition
    Best regards
    Software Press

  3. Pingback: [BLOCKED BY STBV] Enforcing Network Policy Internally, Remotely And To Mobile Devices

  4. I’d appreciate an offline email exchange.
    The question is to malware / mobile devices and business concerns.
    I’m seeking your input over certain concerns (mobile devices).

  5. Pingback: [BLOCKED BY STBV] How to Educate Your Employees About Social Engineering

  6. Hi Joe,

    I stumbled over your ’Social Media Deception’ and I think it proves a very important point. I am practicing IT security at Coop, Danish leading retailer (at least we think so :-)) with 30.000 employees and 1200 stores across the country. We own 4 different chains, and they all think Facebook is fantastic to sell all our goods.

    I have planned a meeting with all the facebook responable people and the presentation I am making to that meeting will have a bit of content from your presentation – I hope that is ok.

    I have downloaded the PDF version of your talk from RSAs website, and unfortunately for the pages that has a bit of powerpoint action on them (picture over picture overlay), it’s impossible to take screenshots and use that for my own presentation – especially the slides about the impact of social media and people trust people has some points I would like to reuse, but are impossible to see 🙁

    So to make a long story short, I would like to have the PPT version of your talk so I can grab the bits and pieces I need for my (strictly internal) presentation.

    Can I get that?

    Thanks in advance – and thanks for the great talk. I really think it’s spot on!


    • Hi Klaus,

      I’m glad you liked the presentation and research. I’m more than happy to share our presentation with you. What email address should I send a download link to?

      If it is ok with you, would you mind sharing your final presentation with me? We love hearing about people using the concepts for their security practice.

      Thank you


      • Hi Joe,

        I thought you could see the email adress I provided with the post – but I guess not.

        Please send the presentation to kap at coop dot dk (trying to not make it myself an easy spam target…)

        I will be happy to send you the presentation – it will be in danish, but if that’s ok with you, it’s ok with me too 🙂



          • Hi Joey, thanks a lot for the presentation. Where should I send my presentation? The email you mention in another post on this site doesn’t work.

            Btw: At Coop we plan to use your case in an internal awareness campaign (a small one, a 2 min video, questionnaire, stickers and posters) – I will keep you posted on how it goes..

            • Looking forward to seeing it. Send it to the email addresses listed in the ABOUT section of this blog. Thanks!

  7. Joseph, this is Harris Andrea from networkstraining.com

    I really love your blog man. You have so much interesting content in here. I’m working in similar fields as you are (network security , cisco asa, penetration testing etc) so I always find your content very useful and helpful.

    Keep up the great work.


Leave a Reply

Your email address will not be published.