BackgroundCheck.run
Search For

Roy D Hodgman, 44238 Brookline St, Cambridge, MA 02139

Roy Hodgman Phones & Addresses

238 Brookline St, Cambridge, MA 02139   

5 William Fairfield Dr, Wenham, MA 01984    978-4687425   

Medford, MA   

Baltimore, MD   

5 William Fairfield Dr, Wenham, MA 01984   

Social networks

Roy D Hodgman

Linkedin

Work

Company: Rapid7 Sep 2014 to Feb 2016 Position: Data scientist

Education

Degree: Master of Science, Masters School / High School: The Johns Hopkins University 2003 to 2004 Specialities: Computer Science

Skills

Wolf • Software

Languages

English

Interests

Exercise • Sweepstakes • Home Improvement • Reading • Gourmet Cooking • Sports • Fishing • Home Decoration • Health • Watching Sports • Photograph • Cooking • Gardening • Outdoors • Sewing • Electronics • Baseball • Crafts • Fitness • Music • Camping • Dogs • Family Values • Movies • Collecting • Christianity • Kids • Medicine • Diet • Automobiles • Cats • Walking • Travel • Watching Baseball • Investing

Industries

Computer Software

Mentions for Roy D Hodgman

Roy Hodgman resumes & CV records

Resumes

Roy Hodgman Photo 19

Lead Data Scientist

Location:
1475 Center St, Ludlow, MA 01056
Industry:
Computer Software
Work:
Rapid7 Sep 2014 - Feb 2016
Data Scientist
Rapid7 Sep 2014 - Feb 2016
Lead Data Scientist
Rapid7 Dec 2012 - Sep 2014
Senior Software Engineer
Rsa Security Apr 2011 - Dec 2012
Principal Technologist
Rsa Security Sep 2005 - Apr 2011
Senior Software Engineer
Gamelogic 2004 - 2005
Software Engineer
Education:
The Johns Hopkins University 2003 - 2004
Master of Science, Masters, Computer Science
The Johns Hopkins University 1998 - 2002
Bachelors, Bachelor of Science, Computer Science
Skills:
Wolf, Software
Interests:
Exercise
Sweepstakes
Home Improvement
Reading
Gourmet Cooking
Sports
Fishing
Home Decoration
Health
Watching Sports
Photograph
Cooking
Gardening
Outdoors
Sewing
Electronics
Baseball
Crafts
Fitness
Music
Camping
Dogs
Family Values
Movies
Collecting
Christianity
Kids
Medicine
Diet
Automobiles
Cats
Walking
Travel
Watching Baseball
Investing
Languages:
English

Publications & IP owners

Us Patents

Techniques Of Providing Authentication From Computer Pointer Interactions

US Patent:
8528049, Sep 3, 2013
Filed:
Dec 21, 2010
Appl. No.:
12/974732
Inventors:
Amnon Khen - Tel Aviv, IL
Roy Hodgman - Wenham MA, US
Alon Kaufman - Bnei-Dror, IL
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
H04L 29/06
US Classification:
726 2, 382119, 382187
Abstract:
A technique provides user authentication. The technique involves generating a pointer data profile entry in a pointer data profile database, the pointer data profile entry having a pointer data profile which is based on first pointer data obtained during a first user session. Such pointer data can be collected from a standard pointing device such as an electronic mouse, a touch-based track pad, a trackball, a scroll wheel, etc. The technique further involves receiving new pointer data during a second user session, and performing an authentication operation based on (i) the pointer data profile entry in the pointer data profile database and (ii) the new pointer data to determine whether a user providing the first pointer data during the first user session and a user providing the new pointer data during the second user session is the same person.

Optimizing Role Level Identification For Resource Allocation

US Patent:
2022019, Jun 23, 2022
Filed:
Mar 9, 2022
Appl. No.:
17/690304
Inventors:
- Boston MA, US
Roy Hodgman - Cambridge MA, US
Assignee:
Rapid7, Inc. - Boston MA
International Classification:
G06F 16/28
H04L 9/40
G06Q 10/06
G06F 16/215
Abstract:
Disclosed herein are methods, systems, and processes to optimize role level identification for computing resource allocation to perform security operations in networked computing environments. A role level classifier to process a training dataset that corresponds to a clean title is generated from a subset of entities associated with the clean title. An initial effective title determined by the role level classifier based on processing the training dataset is assigned to an entity. A new effective title based on feature differences between the initial effective title and the clean title is re-assigned to the entity. Performance of the generating, the assigning, and the re-assigning is repeated using the new effective title instead of the clean title.

Cluster Detection And Elimination In Security Environments

US Patent:
2021038, Dec 9, 2021
Filed:
Aug 24, 2021
Appl. No.:
17/409934
Inventors:
- Boston MA, US
Roy Hodgman - Cambridge MA, US
Assignee:
Rapid7, Inc. - Boston MA
International Classification:
H04L 29/06
G06F 16/28
G06N 20/00
Abstract:
Disclosed herein are methods, systems, and processes to detect valid clusters and eliminate spurious clusters in cybersecurity-based computing environments. A cluster detection and elimination model is trained by accessing a dataset with raw data that includes data points associated with computing devices in a network and applying two or more different clustering methodologies independently to the dataset. The resulting cluster detection and elimination model is used to compare two or more clusters to determine whether a cluster from one clustering methodology matches another cluster from another clustering methodology based on centroid locations and shared data points.

Identifying Network Vulnerabilities

US Patent:
2021036, Nov 18, 2021
Filed:
Aug 2, 2021
Appl. No.:
17/391407
Inventors:
- Boston MA, US
Roy Hodgman - Cambridge MA, US
Assignee:
Rapid7, Inc. - Boston MA
International Classification:
H04L 29/06
G06K 9/62
G06N 3/02
H04L 12/24
Abstract:
Methods and systems for identifying a network vulnerability. The system may gather data regarding a new or previously unknown network device, and compare the gathered data to one or more known devices that are scanned by a vulnerability assessment device. The vulnerability assessment device may then scan the previously unknown device upon a processor determining the previously unknown device shares at least one feature with a known device that is scanned.

Data Exfiltration Detector

US Patent:
2021028, Sep 16, 2021
Filed:
Jun 2, 2021
Appl. No.:
17/336593
Inventors:
- Boston MA, US
Vasudha Shivamoggi - Cambridge MA, US
Roy Hodgman - Cambridge MA, US
Assignee:
Rapid7, Inc. - Boston MA
International Classification:
H04L 29/06
H04L 12/26
H04L 12/24
Abstract:
Disclosed herein are methods, systems, and processes for detecting data exfiltration. A data exfiltration event in a network is detected. Traffic data regarding outgoing traffic of a source in the network associated with the data exfiltration event is received. A logarithmic transformation is applied to the traffic data to generate transformed data. An outlier identification technique is selected based on the transformed data and is executed on the transformed data to determine that the outgoing traffic is indicative of the data exfiltration event. An alert is generated in response to the determination that the outgoing traffic is indicative of the data exfiltration event.

Stable Network User Account Classifier

US Patent:
2020021, Jul 2, 2020
Filed:
Dec 27, 2018
Appl. No.:
16/233631
Inventors:
- Boston MA, US
Roy Hodgman - Cambridge MA, US
International Classification:
H04L 29/06
H04L 29/08
G06K 9/62
Abstract:
Methods and systems for classifying network users. The system may receive a classification of a user account on a network and network activity data associated with the user account. Upon detecting a discrepancy between the expected behavior of the user account based on its classification and the present behavior of the user account, the system may obtain a corroborating result from one or more directory sources. An alert may then be issued based on the detected discrepancy and the corroborating result.

Automating Cluster Interpretation In Security Environments

US Patent:
2020018, Jun 11, 2020
Filed:
Dec 10, 2018
Appl. No.:
16/214309
Inventors:
- Boston MA, US
Roy Hodgman - Cambridge MA, US
International Classification:
G06N 20/00
G06K 9/62
G06N 5/04
G06F 16/28
H04L 29/06
Abstract:
Disclosed herein are methods, systems, and processes to automate cluster interpretation in computing environments to develop targeted remediation security actions. To interpret clusters that are generated by a clustering methodology without subjecting clustered data to classifier-based processing, separation quantifiers that indicate a spread in feature values across clusters are determined and used to discover relative feature importances of features that drive the formation of clusters, permitting a security server to identify features that discriminate between clusters.

Cluster Detection And Elimination In Security Environments

US Patent:
2020017, Jun 4, 2020
Filed:
Nov 29, 2018
Appl. No.:
16/203710
Inventors:
- Boston MA, US
Roy Hodgman - Cambridge MA, US
Assignee:
Rapid7, Inc. - Boston MA
International Classification:
H04L 29/06
G06N 20/00
G06F 16/28
Abstract:
Disclosed herein are methods, systems, and processes to detect valid clusters and eliminate spurious clusters in cybersecurity-based computing environments. A cluster detection and elimination model is trained by accessing a dataset with raw data that includes data points associated with computing devices in a network and applying two or more different clustering methodologies independently to the dataset. The resulting cluster detection and elimination model is used to compare two or more clusters to determine whether a cluster from one clustering methodology matches another cluster from another clustering methodology based on centroid locations and shared data points.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.