Download PDF

Beth Binde

Systems Programmer

  • New Jersey


Information Security 

Work History


Systems Programmer/Administrator

Rutgers University
  • Performs digital forensic examinations 
  • Provides technical leadership for Information Protection and Security Division specializing in security management, incident handling and incident response, and project management of associated activities
  • Project leader for university implementation of data encryption
  • Acts as liaison to law enforcement agencies
  • Installs and administers Windows and Linux workstations
  • Supervises student staff for incident triage and follow up
  • Advises University departments on operating systems security
  • Maintains internal documentation for incident handling process
  • Develops security metrics to chart incident handling trends
  • Attends professional meetings such as EDUCAUSE, High Technology Crime Investigation Association, Infragard, and the New York Electronic Crimes Task Force

Systems Programmer I

Rutgers University
  • Administered, the student computing cluster of about 30 Sun Microsystems hosts running Solaris with more than 40,000 user accounts.Maintained 99% uptime (less than 1% unplanned downtime).
  • Installed and upgraded operating systems and maintained current patch levels
  • Developed scripts in perl, expect and Bourne shell for system administration tasks
  • Supervised 2 FTE systems administrators
  • Investigated and resolved computer abuse incidents along with NBCS User Support (, the Office of Judicial Affairs, the Rutgers University Police and other law enforcement agencies as was needed

Systems Programmer II

Rutgers University
  • Unix system administration duties for various Telecommunications Division workstations and servers
  • Kerberos and whitepages administration

Systems Programmer III

Rutgers University
  • Unix systems administrator for Pyramid Technologies computers


Rutgers University
  • System administrator for PDP 11/44 running RSTS/E


Association for Computing Machinery, Member

ASIS International Member

GIAC Advisory Boards Member

GIAC Ethics Council Vice Chair, 2009-2010; Chair 2011 to present 

High Tech Crime Consortium Member

High Technology Crime Investigation Association Member

Infragard Member

Institute of Electrical and Electronics Engineers (IEEE) Member

(ISC)2 (nternational Information Systems Security Certification Consortium) Member 

MS-ISAC (Multi-States Information Sharing and Analysis Center) Member

New Brunswick Free Public Library Board of Trustees, August 2011 to present 

REN-ISAC (Research and Education Networking Information Sharing and Analysis Center) Member



Oct 2009Oct 2021

GIAC Penetration Tester (GPEN)


The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities.

Aug 2001Aug 2021

GIAC Security Essentials (GSEC)


Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

Jan 2009Jan 2021

GIAC Systems and Network Auditor (GSNA)

GIAC Systems and Network Auditors (GSNAs) have the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems.
Jun 2004Jun 2020

GIAC Certified Forensic Analyst (GCFA)


The GCFA certification is for professionals working in the information security, computer forensics, and incident response fields.

Jun 2003Jun 2019

GIAC Certified Intrusion Analyst (GCIA)


GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.

Dec 2010Dec 2018

GIAC Web Application Penetration Tester (GWAPT)

This certification measures and individuals understanding of web application exploits and penetration testing methodology.
Sep 2006Sep 2018

GIAC Certified Incident Handler (GCIH)

The GCIH certification focuses on detecting, responding, and resolving computer security incidents.
Jan 2012Jan 2018


CISSP® certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security.
Jul 2011Dec 2017

Certified Protection Professional

ASIS International
The Certified Protection Professional (CPP) credential provides demonstrable proof of knowledge and management skills in eight key domains of security.  Badge available for viewing:
May 2010Present

Teaching English as a Foreign Language

Program in American Language Studies, Department of English, Rutgers University
Preparation for teaching English to speakers of other languages.