WarCollar Industries November 2023 - Present

Digital Network Exploitation Analyst

  • Discover, map, and develop exploitation strategies for target networks based on discovered hardware, software, and protocols in use.

Raytheon July 2017 – November 2023

Software Engineer Testing Lead (1yr 4mo)

  • Established testing procedures, documents, and evaluation standards in accordance with published Army doctrine.

  • Examined functionality, security, and integration of offensive cyber tools for use in real world engagements. Lead team of Three test engineers, one developer, and one system admin.

  • Built threat representative attack surfaces including all network infrastructure, servers, and clients.

  • Experience in software fuzzing, client penetration testing, security analysis, and vulnerability research.

Digital Network Analyst (4yr 6mo)

  • Evaluated the architecture, topology of software, hardware, networks, LAN-WAN- Telecom systems, their components, associated protocols, and standards, and how they integrate with one another.

  • Created custom scripts in python to improve processing and analytics by automating non-standard data conversion.

  • Conducted vulnerability analysis and assessments and wrote reports to inform customer computer network activity that led to successful network operations.

  • Maintained customer targeting databases and ensured compliance with all laws and regulations.

  • Scanned, translated, coordinated, and authored numerous reports which offered valuable insight to IC partners and customers.

National Security Agency July 2016 – July 2017

Chinese Linguist / Language Analyst Development Program

  • Contributed to reports that were praised as critical to DIA, CIA, State Department, and the Office of the President.

  • Authored multiple reports on new undiscovered technologies and intelligence sources.

  • Conducted research and analysis using a variety of analytic tools, databases, and open-source material. Used both DNI and DNR to build comprehensive target profiles.

  • Translated highly technical information and analyzed network information for intelligence operations.

  • Trained joint service members on analytic tools and tradecraft. Maintained databases and conducted auditing to ensure current lawful targeting.

  • Briefed team missions to both civilian and military senior leadership.

US Army (Active and Reserves) November 2009 – July 2022

Chinese Linguist / SIGINT NCO

  • Provided senior leadership to a real time language support watch floor, in support of Operation Enduring Freedom.

  • Possess a U.S. Army specialty skill identifier of T5 for Digital Network Intelligence. Authored and contributed to numerous reports in support of NSA/CSS missions.

  • Translated highly technical information and analyzed network information for intelligence operations.

  • Awarded a Joint Service Commendation Medal for extensive collaboration with other offices and agencies to revive a previously disregarded target set.

  • Trained joint service members on analytic tools and tradecraft.

  • Providing leadership, management, accountability, training, and mentorship for a team of 18 soldiers, in a joint-military and civilian environment.

  • Maintaining a Chinese language proficiency of 2/2 on the Defense Language Proficiency Test.

  • Acted as the head retention officer in order to ensure a future quality workforce for the unit.

  • Performing duties at higher levels of responsibility and leadership, above the current rank, surpassing the expectations of superiors and demonstrating professionalism.

  • Develop and execute training for over 200 soldiers, which increased unit readiness by 20%.

Experience

Education

University of Maryland Global Campus - Masters of Cyber Security Technologies, 2022

University of Maryland Global Campus - Bachelors of Science, Cybersecurity, 2019

Defense Language Institute Foreign Language Center - Associates of Chinese Mandarin, 2012

Training

  • GIAC Sec560, 2023

  • Hands on Hacking Fundamentals, Black Hat, 2019

  • Python Hackers Boot camp, Black Hat, 2018

  • Certified Ethical Hacking, 2017

  • Reporting boot camp, 2015

  • Digital network intelligence boot camp, 2014

  • Basic cryptologic analyst course, Goodfellow Air Force base, 2012