Military Cybersecurity Experts (12 records)

ID Title Candidate Summary* State Relocation
Information Assurance Engineer
15 Years Intelligence & Cyber Security professional with experience performing technical threat analysis, multi-source analysis, and intelligence analysis in a military or intelligence community organization.

Intelligence Analyst with expert understanding of military applications and intelligence operations to collate intelligence related to cyber threat and vulnerability while strictly following security classification and dissemination guidelines.

Technical qualifications and background include but are not limited to Cyber Security, Computer Forensics, and Vulnerability Analysis.

Has Masters Degree in Information Security and Assurance and also CISSP Certified
FL
Yes
Information Security Intelligence Officer
Trained and led Intelligence Collection and Reporting Team
Produced over 100 critical intelligence briefings reviewed throughout Navy up to the Executive office.

Skills Include:
- Network intelligence analysis
- Treat analysis & tracing
- Social networking pattern analysis
- Very adptable and quick learner.
- Effective communicator
- Tenatious analytical thinker
CA
Yes
Strategic Security & Communications Leader
Results-oriented leader and Veteran with 24+ years of military and 10 years of Special Operations communications experience. Hands on leading of project based operations and teams in the testing and development, installation, operation, monitoring, troubleshooting, security, customer support and configuration control of enterprise communications. .
Certifications: PMP, CCNP, CISSP, CCNA, etc.
NJ
Yes
Cyber Intelligence Threat Manager
- NSA's Senior Cyber Threat Analyst for a 54 member Analysis and Production Team
- 5 years at NSA analyzing and developing processes to analyze forensic intrusion data for the Federal Government.
- Operations Chief for a major Data Acquisition and Analysis organization within the National Security Agency (NSA)
- 20 years in U.S. Navy Information Command


.
TX
No
Intelligence Analyst
• Skilled in conducting multi-intelligence (human intelligence [HUMINT], counterintelligence [CI], signals intelligence [SIGINT], communications intelligence [COMINT], imagery intelligence [IMINT], and open source intelligence [OSINT]) analysis in collaborative, operational team environments
• Experienced working intelligence operations in the following capacities; network and asymmetric threat analysis; counter-IED (C-IED) analysis; high value individual (HVI) targeting; imagery exploitation; tribal engagement; indications and warning; signal analysis; intelligence collection systems; geographic profiling; infrastructure analysis; terrain analysis; threats assessments; counterinsurgency; counter-terrorism; vulnerabilities assessments; irregular warfare; special access programs
• Expert use of databases, data mining, and visualizations
PA
Yes, For the right opportunity
Communications Security Manager
Accomplished and Certified Senior IT and DOD Security and Operations Management Professional with extensive Architecture, Solution Delivery, Incident Management, and Team Development expertise inclusive of the military.
Results driven leader with broad experience producing technical solutions indiverse network environments; a strong emphasis in Cyber and Communications Security.
Tx
No
Remediation, Agent Deployment
Intelligence & Cyber Security professional with experience performing technical threat analysis, multi-source analysis, and intelligence analysis in a military or intelligence community organization.
<br>
Intelligence Analyst with expert understanding of military applications and intelligence operations to collate intelligence related to cyber threat and vulnerability while strictly following security classification and dissemination guidelines.
<br>
A data analyst with experience providing technical support while maintaining responsibility for research, analysis, presentation, and publication of all-source analysis and force protection (FP) intelligence in support of operationally deployed forces. Ability to manage multiple research projects by gathering
<br>
Counterintelligence (CI), Human Intelligence (HUMINT), and Signals Intelligence (SIGINT) to support daily intelligence information research, defense threat assessments, intelligence briefs and provide analytical support to military operations.
<br>
Technical qualifications and background include but are not limited to Cyber Security, Computer Forensics, and Vulnerability Analysis.
TX
Yes
Communications and Cyber Domain Specialist
Cyber network operations center specialist. Crytographic Certified Leader on secure military networks managing up to 10,000 devices.
Responsible for Military SOC - Monitoring, securing, managing hardware & software of millitary networks.
Managed highly automated control systems networks on USS Essex.
Extremely fast learner & adapter to new situations.
TX
No
Intelligence Analyst
Over 11 years of experience in the military, and 9 years in the Intelligence Community, with proven expertise in HUMINT, targeting, analysis and management.
Experience leading, managing and supporting tactical and non-tactical operations. As a leader, I have been recognized for my ability
Experience in the field of HUMINT instruction and conducting full spectrum HUMINT operations.
DoD trained and certified as a Strategic Debriefer and a Spanish Linguist.
VA
Yes
Information Assurance Manager
Security Control Assessor (SCA), Air Force Office of Special Investigations Program Security Office (AFOSIPJ).- Performed oversight of the development, implementation and evaluation of information system securityprogram policy; special emphasis placed upon integration of existing SAP network infrastructures.- Performed analysis of network security, based upon the DCID 6/3, JSIG, and NISPOM Chapter 8, certificationand accreditation process; advise customer on IT certification and accreditation issues.
FL
Yes
Cryptologic Technician
Cryptologic Technician
 Signal and intelligence analysis for the Department of Defense (DoD) and National Security Agency (NSA).
 Support the DoD and NSA in cybersecurity at NSA Texas.
Texas
Yes
Cyber Security Manager
Assisted in the development and execution of security policies, plans and procedures. Designed and implemented data network security measures, network intrusion forensics, and certification of systems and networks.

• Maintained certification and accreditation of classified and unclassified networks spread across multiple geographic regions

• Proactively researched real world attacks and provided relevant point papers on attacks and protecting best practices

• Assisted in the coordination efforts with peer, and subordinate commands providing guidance and troubleshooting high visibility issues

• Maintained and improved the Cyber Security posture of the Command's IT infrastructure in relation to today's published best practices
FL
For the right opportunity