BackgroundCheck.run
Search For

Jorge Muniz, 50508 Estella Ave, Las Vegas, NV 89107

Jorge Muniz Phones & Addresses

508 Estella Ave, Las Vegas, NV 89107   

4100 Bonanza Rd, Las Vegas, NV 89107   

4505 Maplewood Ave, Los Angeles, CA 90004   

Mentions for Jorge Muniz

Jorge Muniz resumes & CV records

Resumes

Jorge Muniz Photo 34

Jorge Muniz

Position:
Associate Professor of Music - Composition and Theory at Indiana University South Bend
Location:
South Bend, Indiana
Industry:
Higher Education
Work:
Indiana University South Bend - South Bend, Indiana since Aug 2006
Associate Professor of Music - Composition and Theory
Indiana University South Bend Aug 2009 - May 2012
Coordinator of Music
Indiana University South Bend - Ernestine M. Raclin School of the Arts Aug 2008 - Jul 2010
Director of Graduate Studies
Manhattan School of Music Aug 2002 - May 2006
Theory Faculty
Education:
Manhattan School of Music 2000 - 2004
Doctor of Musical Arts, Composition
Carnegie Mellon University 1998 - 2000
Master of Music, Composition
Honor & Awards:
Who's Who in America 2007-2012 Who's Who in the World 2009-2012 Fulbright Scholar 1998 Rotary Goodwill Ambassadorial Scholar 2000
Jorge Muniz Photo 35

Jorge Muniz

Position:
Research Scientist at McAfee
Location:
Orange County, California Area
Industry:
Computer & Network Security
Work:
McAfee since Jan 2007
Research Scientist
United States Navy Jan 2006 - Jan 2010
Petty Officer
VisionScape Imagery Jan 2007 - Aug 2007
Software Engineer
Education:
Santa Ana College
AA, Law, Criminal Justice
Skills:
Web application security, network security, network packet inspection and socket programming, web development, SOA, SaaS, cloud services
Jorge Muniz Photo 36

Jorge Muniz

Location:
United States
Jorge Muniz Photo 37

Jorge Muniz

Location:
United States
Jorge Muniz Photo 38

Jorge Muniz

Location:
United States

Publications & IP owners

Us Patents

System And Method For Grouping Computer Vulnerabilities

US Patent:
2013024, Sep 19, 2013
Filed:
Sep 21, 2011
Appl. No.:
13/239271
Inventors:
Alexander Lawrence Leroux - Cypress CA, US
Charles Mallabarapu - Laguna Niguel CA, US
Jorge Armando Muniz - Costa Mesa CA, US
Braden C. Russell - Ladera Ranch CA, US
Zengjue Wu - Aliso Viejo CA, US
International Classification:
G06F 21/00
G06F 11/30
US Classification:
726 25
Abstract:
A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a program, and updating the program by adding a new vulnerability to the vulnerability set. More specific embodiments include a program that includes a scan, creating the vulnerability set by generating a query including one or more conditions associated with the vulnerabilities, and creating the vulnerability set by selecting one or more vulnerabilities from a plurality of vulnerabilities. Other embodiments include a program that includes a report template, adding a vulnerability set to the report template by generating a query to include a condition associated with the vulnerability set, running a scan, and generating a report including one or more results from the scan meeting the condition associated with the vulnerability set.

System And Method For Grouping Computer Vulnerabilities

US Patent:
2013024, Sep 19, 2013
Filed:
Oct 11, 2011
Appl. No.:
13/270946
Inventors:
Alexander Lawrence Leroux - Cypress CA, US
Charles Mallabarapu - Laguna Niguel CA, US
Jorge Armando Muniz - Costa Mesa CA, US
Braden C. Russell - Ladera Ranch CA, US
Zengjue Wu - Aliso Viejo CA, US
International Classification:
G06F 21/20
US Classification:
726 25
Abstract:
A system and method in one embodiment includes modules for creating an asset tag including one or more conditions of an asset on a network, adding the asset tag to an asset report template, and generating an asset report from the asset report template. More specific embodiments include creating the asset tag by generating a query for the one or more conditions. The asset tag may include a second asset tag configured to be updated automatically, and a third asset tag configured to be updated manually, and the second asset tag may be updated automatically when the asset tag is updated. Other embodiments include creating a vulnerability set including a selection of vulnerabilities from a plurality of vulnerabilities, adding the vulnerability set to the asset report template, and scanning a plurality of assets on the network.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.