| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Top Secret/SCI, Active DHS EODEXECUTIVE SUMMARYCybersecurity professional experienced in leading unique analytical and investigative issues. Strong supervisory skills evident in developing staff members to perform at peak levels. Proven ability to create detailed analysis, partner with business and IT to implement solutions that turn challenges into results, mitigate risks, and enhance organizational effectiveness.Cyber skillsetDetection EngineeringOSINT InvestigationsExcellent Oral and Written CommunicationThreat HuntingThreat infrastructure monitoringSIEM ToolsMalware researchAdversary Network DevelopmentThreat Intelligence RepositoriesSignature AchievementsInstrumental in researching, analyzing, and writing over 60 threat intelligence products which were utilized to implement stronger security for Senate networks.Trained and advanced the skills of a team of more of 70 members on how to properly use intelligence tools and methodologies.Founding member of USPS Risk Based Alert team and co-wrote over 100 unique Splunk detections which substantially lowered the USPS Operations branchs risk score.Reviewed, analyzed, and mapped over 160 data objects for intelligence value and created analysis of data metrics for each object culminating in a 41 page data audit report designed to enhance data sharing.EDUCATIONBachelors of Arts in Political Science, Political ScienceAshford University, Clinton, IAUS Army Primary Leadership Development CourseFt. Benning, GAGIAC Cyber Threat IntelligenceSANS Digital Forensics EssentialsWORK EXPERIENCEIntelligence Analyst Oct 2005- PresentDHS CISA Capacity Building (CB), Deputy PM (December 2022 Present) Washington, DCSupervise and mentor a team of 6 junior analysts in both day-to-day client duties as well as guiding them through professional training and improvement programs on the CISA VM Insights program supporting Risk and Mitigation. Collaborate with prime contract leadership to ensure all KPIs are being met and the analysts are well representing phia both technically and professionally.As part of billing duties for Capacity Building conduct on site research, compilation, analysis, and production of cyber threat intelligence (CTI) standards mapping products which aligned 46 different standards and workflows across more than 100 different data objects. Provide expertise on cyber threat intelligence, analysis, and best practices. Support to Automated Indicator Sharing (AIS) platform working to ensure the system and service provide actionable indicators of compromise (IOCs) and relevance in machine readable formats.USPS Cyber Threat Intelligence Analyst (June 2019 December 2022) Washington, DCProvides expertise for developing and implementing the Corporate Information Security Offices cyber threat intelligence capability, federated across multiple operational units. Conducts research and evaluate technical and all-source cyber intelligence to develop in-depth analysis and assessment on threats to critical networks and critical infrastructure. Analyzes network events to determine the impact on current operations and conduct all-source research to determine adversary capability and intent. Analyzes commercial and open-source intelligence feeds, adding context, and sharing key findings through formal and informal executive briefings. Develops and update Splunk queries/dashboards. Creates and supports data processing pipelines and storage systems for threat intelligence data. Partnered with security application owners, CSOC analysts, security engineers, and management to create and deploy risk rules under the Risk Based Alerting methodology. Researched, designed, tested, and tuned over 100 custom Splunk-based detections tailored for the clients network. Reduced a severely high alert pipeline in the CSOC to a manageable amount with a substantially increased true positive rate.Family Caretaker (May 2018-June 2019)Cyber Threat Intelligence Analyst (January 2017 May 2018)United States Senate, Washington, DCLead analyst to identify trends, assess future threats and risks, and prepare senior leaders briefings on mission critical insights. Played key role in reviewing system logs, collecting and analyzing indicators of compromise (IOC) and defending targeted networks from potential nation-state Advanced Persistent Threat and criminal cyber-attacks. Partnered with Security Operations Center personnel to evaluate collected intelligence data for the purpose of providing network security support and enabling the senior leader-level decision making process. Conducted passive and active threat hunting in support of CSOC operations.Intelligence Analyst (August 2015 - September 2016)Joint Improvised Threat Defeat Agency, Reston, VADeveloped and tested web-based tools that were designed for analyzing large data volumes. Mentor and train defense team utilizing pertinent tools and methodologies to ensure broad understanding of mission goals. Identified new system requirements from field-based users and worked with developers to implement technology and process improvements.Intelligence Analyst (November 2013 - June 2015)Joint Special Operations Command, Fort Bragg, NCAnalyst responsibilities included supporting, coordination and providing intelligence to special operations, combatant command, and other necessary intelligence members and organizations. Tasked with monitoring terrorist cells and networks in the southwest and southeast regions of Asia to track and predict their activities. Wrote and maintained proper documentation for special products.Key Achievements:Created senior level briefings to depict trends, techniques, procedures, and motivations of said terrorist cells and networks.Participated in special working groups in coordination with intelligence professionals focusing on the South and Southeast Asia in order to prepare friendly forces to respond to adversarial networks.Counter-Intelligence Analyst (October 2012 - September 2013)United States Central Command,Ft Devens, MAIdentified potential inside the wire; threats utilizing cross-database comparisons and research tocreate analytical products briefed to Coalition Forces.Analyzed insurgent networks to identify and exploit potential leads into the network for furtheranalysis and exploitation.Created in-depth briefings on networks, activities, members, and potential threats which were utilizedin command level presentations.Intelligence Analyst (May 2011 - April 2012)United States Special Operations Command, AFGAnalyst support for operations and assisted collectors in developing collection plans. Conducted document and media exploitation. Collaborated with multiple US and British military and intelligence agencies. Partnered with multiple collection assets to find, develop, target, and exploit numerous networks. Produced and successfully executed multiple targeting packets.Key Achievements:Wrote and co-produced hundreds of intelligence documents for the command as well as multiple widely released intelligence reports for the Intelligence Community.All Source Intelligence Analyst, Sergeant (E5) (October 2005 - March 2011)United States ArmyConducted multiple analysis that focused on threat analysis. Contributed expertise in creating threat assessments. Responsible for researching, analyzing, planning, producing and disseminating intelligence products. Trained team members on multiple task to include developing skills on how to perform all-source analysis, tactical level operations and responsibilities:Key Achievements:Produced and briefed to senior leaders over 230 intelligence products in support of US Army Central operations. |