Fortify Experts
Military Cybersecurity Experts (12 records)
ID | Title | Candidate Summary* | State | Relocation |
---|---|---|---|---|
Information Assurance Engineer
|
15 Years Intelligence & Cyber Security professional with experience performing technical threat analysis, multi-source analysis, and intelligence analysis in a military or intelligence community organization.
Intelligence Analyst with expert understanding of military applications and intelligence operations to collate intelligence related to cyber threat and vulnerability while strictly following security classification and dissemination guidelines. Technical qualifications and background include but are not limited to Cyber Security, Computer Forensics, and Vulnerability Analysis. Has Masters Degree in Information Security and Assurance and also CISSP Certified |
FL
|
Yes
|
|
Information Security Intelligence Officer
|
Trained and led Intelligence Collection and Reporting Team
Produced over 100 critical intelligence briefings reviewed throughout Navy up to the Executive office. Skills Include: - Network intelligence analysis - Treat analysis & tracing - Social networking pattern analysis - Very adptable and quick learner. - Effective communicator - Tenatious analytical thinker |
CA
|
Yes
|
|
Strategic Security & Communications Leader
|
Results-oriented leader and Veteran with 24+ years of military and 10 years of Special Operations communications experience. Hands on leading of project based operations and teams in the testing and development, installation, operation, monitoring, troubleshooting, security, customer support and configuration control of enterprise communications. .
Certifications: PMP, CCNP, CISSP, CCNA, etc. |
NJ
|
Yes
|
|
Cyber Intelligence Threat Manager
|
- NSA's Senior Cyber Threat Analyst for a 54 member Analysis and Production Team
- 5 years at NSA analyzing and developing processes to analyze forensic intrusion data for the Federal Government. - Operations Chief for a major Data Acquisition and Analysis organization within the National Security Agency (NSA) - 20 years in U.S. Navy Information Command . |
TX
|
No
|
|
Intelligence Analyst
|
• Skilled in conducting multi-intelligence (human intelligence [HUMINT], counterintelligence [CI], signals intelligence [SIGINT], communications intelligence [COMINT], imagery intelligence [IMINT], and open source intelligence [OSINT]) analysis in collaborative, operational team environments
• Experienced working intelligence operations in the following capacities; network and asymmetric threat analysis; counter-IED (C-IED) analysis; high value individual (HVI) targeting; imagery exploitation; tribal engagement; indications and warning; signal analysis; intelligence collection systems; geographic profiling; infrastructure analysis; terrain analysis; threats assessments; counterinsurgency; counter-terrorism; vulnerabilities assessments; irregular warfare; special access programs • Expert use of databases, data mining, and visualizations |
PA
|
Yes, For the right opportunity
|
|
Communications Security Manager
|
Accomplished and Certified Senior IT and DOD Security and Operations Management Professional with extensive Architecture, Solution Delivery, Incident Management, and Team Development expertise inclusive of the military.
Results driven leader with broad experience producing technical solutions indiverse network environments; a strong emphasis in Cyber and Communications Security. |
Tx
|
No
|
|
Remediation, Agent Deployment
|
Intelligence & Cyber Security professional with experience performing technical threat analysis, multi-source analysis, and intelligence analysis in a military or intelligence community organization.
<br> Intelligence Analyst with expert understanding of military applications and intelligence operations to collate intelligence related to cyber threat and vulnerability while strictly following security classification and dissemination guidelines. <br> A data analyst with experience providing technical support while maintaining responsibility for research, analysis, presentation, and publication of all-source analysis and force protection (FP) intelligence in support of operationally deployed forces. Ability to manage multiple research projects by gathering <br> Counterintelligence (CI), Human Intelligence (HUMINT), and Signals Intelligence (SIGINT) to support daily intelligence information research, defense threat assessments, intelligence briefs and provide analytical support to military operations. <br> Technical qualifications and background include but are not limited to Cyber Security, Computer Forensics, and Vulnerability Analysis. |
TX
|
Yes
|
|
Communications and Cyber Domain Specialist
|
Cyber network operations center specialist. Crytographic Certified Leader on secure military networks managing up to 10,000 devices.
Responsible for Military SOC - Monitoring, securing, managing hardware & software of millitary networks. Managed highly automated control systems networks on USS Essex. Extremely fast learner & adapter to new situations. |
TX
|
No
|
|
Intelligence Analyst
|
Over 11 years of experience in the military, and 9 years in the Intelligence Community, with proven expertise in HUMINT, targeting, analysis and management.
Experience leading, managing and supporting tactical and non-tactical operations. As a leader, I have been recognized for my ability Experience in the field of HUMINT instruction and conducting full spectrum HUMINT operations. DoD trained and certified as a Strategic Debriefer and a Spanish Linguist. |
VA
|
Yes
|
|
Information Assurance Manager
|
Security Control Assessor (SCA), Air Force Office of Special Investigations Program Security Office (AFOSIPJ).- Performed oversight of the development, implementation and evaluation of information system securityprogram policy; special emphasis placed upon integration of existing SAP network infrastructures.- Performed analysis of network security, based upon the DCID 6/3, JSIG, and NISPOM Chapter 8, certificationand accreditation process; advise customer on IT certification and accreditation issues.
|
FL
|
Yes
|
|
Cryptologic Technician
|
Cryptologic Technician
Signal and intelligence analysis for the Department of Defense (DoD) and National Security Agency (NSA). Support the DoD and NSA in cybersecurity at NSA Texas. |
Texas
|
Yes
|
|
Cyber Security Manager
|
Assisted in the development and execution of security policies, plans and procedures. Designed and implemented data network security measures, network intrusion forensics, and certification of systems and networks.
• Maintained certification and accreditation of classified and unclassified networks spread across multiple geographic regions • Proactively researched real world attacks and provided relevant point papers on attacks and protecting best practices • Assisted in the coordination efforts with peer, and subordinate commands providing guidance and troubleshooting high visibility issues • Maintained and improved the Cyber Security posture of the Command's IT infrastructure in relation to today's published best practices |
FL
|
For the right opportunity
|