WarCollar Industries November 2023 - Present
Digital Network Exploitation Analyst
Discover, map, and develop exploitation strategies for target networks based on discovered hardware, software, and protocols in use.
Raytheon July 2017 – November 2023
Software Engineer Testing Lead (1yr 4mo)
Established testing procedures, documents, and evaluation standards in accordance with published Army doctrine.
Examined functionality, security, and integration of offensive cyber tools for use in real world engagements. Lead team of Three test engineers, one developer, and one system admin.
Built threat representative attack surfaces including all network infrastructure, servers, and clients.
Experience in software fuzzing, client penetration testing, security analysis, and vulnerability research.
Digital Network Analyst (4yr 6mo)
Evaluated the architecture, topology of software, hardware, networks, LAN-WAN- Telecom systems, their components, associated protocols, and standards, and how they integrate with one another.
Created custom scripts in python to improve processing and analytics by automating non-standard data conversion.
Conducted vulnerability analysis and assessments and wrote reports to inform customer computer network activity that led to successful network operations.
Maintained customer targeting databases and ensured compliance with all laws and regulations.
Scanned, translated, coordinated, and authored numerous reports which offered valuable insight to IC partners and customers.
National Security Agency July 2016 – July 2017
Chinese Linguist / Language Analyst Development Program
Contributed to reports that were praised as critical to DIA, CIA, State Department, and the Office of the President.
Authored multiple reports on new undiscovered technologies and intelligence sources.
Conducted research and analysis using a variety of analytic tools, databases, and open-source material. Used both DNI and DNR to build comprehensive target profiles.
Translated highly technical information and analyzed network information for intelligence operations.
Trained joint service members on analytic tools and tradecraft. Maintained databases and conducted auditing to ensure current lawful targeting.
Briefed team missions to both civilian and military senior leadership.
US Army (Active and Reserves) November 2009 – July 2022
Chinese Linguist / SIGINT NCO
Provided senior leadership to a real time language support watch floor, in support of Operation Enduring Freedom.
Possess a U.S. Army specialty skill identifier of T5 for Digital Network Intelligence. Authored and contributed to numerous reports in support of NSA/CSS missions.
Translated highly technical information and analyzed network information for intelligence operations.
Awarded a Joint Service Commendation Medal for extensive collaboration with other offices and agencies to revive a previously disregarded target set.
Trained joint service members on analytic tools and tradecraft.
Providing leadership, management, accountability, training, and mentorship for a team of 18 soldiers, in a joint-military and civilian environment.
Maintaining a Chinese language proficiency of 2/2 on the Defense Language Proficiency Test.
Acted as the head retention officer in order to ensure a future quality workforce for the unit.
Performing duties at higher levels of responsibility and leadership, above the current rank, surpassing the expectations of superiors and demonstrating professionalism.
Develop and execute training for over 200 soldiers, which increased unit readiness by 20%.
Experience
Education
University of Maryland Global Campus - Masters of Cyber Security Technologies, 2022
University of Maryland Global Campus - Bachelors of Science, Cybersecurity, 2019
Defense Language Institute Foreign Language Center - Associates of Chinese Mandarin, 2012
Training
GIAC Sec560, 2023
Hands on Hacking Fundamentals, Black Hat, 2019
Python Hackers Boot camp, Black Hat, 2018
Certified Ethical Hacking, 2017
Reporting boot camp, 2015
Digital network intelligence boot camp, 2014
Basic cryptologic analyst course, Goodfellow Air Force base, 2012