Technically driven and enthusiastic to learn new things in Cyber and the Coding realm. Prior Army Soldier and Combat Veteran with experience working in Offensive Cyber Operations and SIGINT within the Intelligence Community. Proficient in Computer Networking, Windows & UNIX OS, BASH & Powershell Scripting, Malware Triage & Prosecution, Penetration Testing, Computer Forensics & Incident Response.
Security Clearance
Active – Top Secret/SCI (January 2014)
Active – CI Scope Polygraph (May 2019)
Professional Experience Summary
Booz Allen Hamilton – Computer Scientist/DNEA (November 2020 – May 2021)
US ARMY – Signals Intelligence Analyst (November 2013 – December 2020)
November 2020 – May 2021, Booz Allen Hamilton, National Security Agency, Fort Meade, MD
Computer Scientist / Digital Network Exploitation Analyst (DNEA), Joint Task Force (JTF) - Ares
Performed Cyber/SIGINT ISR against foreign adversary computer networks. Identified functions of foreign and adversarial digital network elements in order to reconstruct and understand network infrastructure, and/or identify and evaluate target network access and exploitation opportunities.
Evaluated and documented adversarial network function, structure, components, physical and logical connectivity, and vulnerabilities by applying knowledge of enterprise architectures and topology of software, hardware, and networks (which includes physical, virtual, and cloud WANS, CANS, LANS, telecommunication systems, their components and associated protocols and standards).
Shared collaborative knowledge with JTF-Ares CMT’s to ensure highest quality for efforts against foreign and adversarial computer and telecommunication network elements.
Developed analytical tradecraft in effort to enhance methods and capabilities towards SIGINT discovery and analysis.
October 2017 – December 2020, 715th MI BN, Computer Network Operations, National Security Agency, HI
Conducted extensive research using Signals Intelligence (SIGINT) systems and open-source information for initial reconnaissance efforts against target computer networks in support of Offensive Cyber Operations.
Identified vulnerabilities to exploit various computer networks for access into challenging foreign target systems to enable collection of Foreign Intelligence (FI).
Utilized knowledge of methods and tools for exploitation and analysis of computer systems and network vulnerabilities to create operational plans to exploit foreign networks while using methods, strategies, and techniques of evading detection when conducting various computer network operations.
Identified types and functions of computer and telecommunications network elements, documenting their intercommunications, and mapping physical and logical target networks by graphing their communications.
September 2015 – October 2017, National Security Agency, Fort Meade, MD
Target Digital Network Analyst / Target Analyst Reporter / Mobile Forensic Analyst
Utilized principles and practices related to target development such as in-depth target knowledge, associations (e.g., social network analysis), communication systems and infrastructure, to advance the discovery and characteristics of highly sensitive Counterterrorism (CT) target networks and persona.
Conducted forensic analysis to assist foreign Intelligence Community partners with U.S. support to global CT investigations.
Collaborated with various agencies and partners to solve technical challenges to identify ways for discovery and enumeration of targets and reinforced the effort of U.S. support to global CT events.
Authored and disseminated numerous formal technical reports on foreign intelligence acquired by various SIGINT/Cyber assets to answer Information Need’s (IN’s) in support of U.S. high-level decision makers.
September 2015 – March 2016, Bagram Air Base, Afghanistan
Deployed SIGINT Analyst
Provided time-sensitive SIGINT analysis and support for U.S. Forces – Afghanistan (USFOR-A) combat operations.
Authored and disseminated thousands of time-sensitive reports arming TAAC and Special Operations organizations with critical information on force protection threats, targets of interest, and indications and warnings.
Led a team of contractor personnel as the day shift lead and briefed NATO/U.S. Commanders daily for continuity and awareness of the mission.
Provided numerous intelligence tippers to a national level organization reliant on essential collaboration and input to serialized reporting.
Education
Pursuing B.S. in Information Technology – Present, Expected completion December 2023 - AMU
A.A.S. in Intelligence Operations Studies – Cochise College, AZ – October 2017
Certification
GIAC Penetration Tester (GPEN) – December 2019
GIAC Certified Forensic Examiner (GCFE) – October 2019
GIAC Certified Incident Handler (GCIH) – September 2019
Training History
Computer Network Operations Qualification Course (CNOQC) – Completed in October 2020
Web App Penetration Testing
Network Penetration and Ethical Hacking
Hacker Techniques, Exploits, and Incident Handling