Jon Gorenflo
Principal InstructorInformation Security Consultant at Fundamental Security
Specialities
Offensive Operations
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsOffensive Operations
When Jon Gorenflo took a job as a network administrator early in his career, the security responsibility of the position was mentioned almost as an afterthought. However, “it didn't take long for me to realize I was spending 90 percent of my time administering security products,” he says. With no seasoned security veterans internally for Jon to lean on, he collaborated with teammates and found mentors by taking SANS classes, reading the SANS Pen Test blog and listening to the Security Weekly Podcast.
I can honestly say I have learned a lot more than I thought I was going to before the course started. I would like to thank Jon for making the course very enjoyable and breaking it down so that all users can understand.
Jon's experience and anecdotes are extremely helpful in understanding the course content and tools. He breaks down large complex areas into smaller, easy to understand concepts which are then backed up by the labs.
Jon did a nice job. He has a good pace, reviews what was covers to reinforce content, and brings a lot of professional experience to the table.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
"This workshop is a hands-on session focused on creating custom Nmap NSE scripts tailored for the CISA Known Exploited Vulnerabilities Catalog. In this 2-hour workshop, participants will learn essential NSE scripting skills, with a specific emphasis on detecting vulnerabilities listed in the catalog.
Businesses and organizations have been playing a game of cat and mouse with hackers for close to 50 years. The score depends on how you decide to keep it.
Step into an inspiring conversation with SANS Instructors Jonathan Reiter, Christopher Elgee, and Jon Gorenflo—esteemed professionals who have seamlessly transitioned from military service to thriving careers in cybersecurity. Whether you're a current service member, a veteran, or someone looking to understand the unique advantages of a military background in the cyber world, this session is for you! Meet the Speakers: • Jonathan Reiter, Senior Master Sergeant (E8) & Certified Instructor: With years of experience in military cyber operations, Jonathan brings invaluable insights into the skills and discipline honed in the service and how they translate into success in the private sector. • Christopher Elgee, Certified Instructor & Senior Security Analyst, Counter Hack: A seasoned instructor with a deep understanding of offensive cyber tactics, Christopher will share his journey from military duty to becoming a leading voice in cybersecurity education and practice. • Jon Gorenflo, Principal Instructor: As a former military cyber professional now excelling in the civilian world, Jon offers a unique perspective on the transition process, the challenges faced, and the opportunities available. What You'll Learn: • The parallels between military and private sector cyber roles • How military experience can provide a solid foundation for a cybersecurity career • Tips and advice on transitioning from military service to the civilian cyber industry • Answers to your burning questions about leveraging military skills in the cyber realm Why Attend? • Inspiration: Hear firsthand stories of transformation and success. • Insight: Gain practical advice on making your own career shift. • Connection: Network with like-minded professionals and expand your support system. Engage in a dynamic discussion and leave with a clearer path to your future in cybersecurity.
Review relevant educational resources made with contribution from this instructor.