We provide IT Staff Augmentation Services!

Delete This

5.00/5 (Submit Your Rating)

Information Security professional with experience performing technical threat analysis, multi-source analysis, and intelligence analysis in a military or intelligence community organization. Intelligence Analyst with expert understanding of military applications and intelligence operations to collate intelligence related to cyber threat and vulnerability while strictly following security classification and dissemination guidelines. A data analyst with experience providing technical support while maintaining responsibility for research, analysis, presentation, and publication of all-source analysis and force protection FP intelligence in support of operationally deployed forces. Ability to manage multiple research projects by gathering Counterintelligence CI , Human Intelligence HUMINT , and Signals Intelligence SIGINT to support daily intelligence information research, defense threat assessments, intelligence briefs and provide analytical support to military operations. Technical qualifications and background include but are not limited to Cyber Security, Computer Forensics, and Vulnerability Analysis.

Department of Defense Decorations

Joint Service Commendation Medal, Joint Service Achievement Medal, Joint Meritorious Unit Award, National Defense Service Medal, Global War on Terrorism Service Medal, Iraq Campaign Medal with Campaign Star, Army Service Ribbon, Overseas Service Ribbon, Armed Forces Reserve Medal

Technical Environment Information Systems

CIDNE, RIDgE Data System, Evidence Tracker SAP , EnCase, WebTAS-Intelligence Software Solutions, WebTAS Air Force National Tactical Integration AFNTI , WebTAS-Civil Aviation Knowledge Base CAKB , WebTAS-USCG Enterprise Intelligence Framework, WebTAS-C-RAM Knowledge Management System KMS , WebTAS-Counterintelligence Common Operational Picture CICOP , WebTAS-Geospatial Query/SQL Dashboard, Green Reports, DOMEX, DAAS, LOGSA, SOS, INDURE, NALCOMIS, JOCWATCH Reporting, Analyst NoteBook

Confidential

Play a key role in the interpretation and exploitation of intelligence gathered from or about the enemy via information security systems. Intelligence Analysts provide Army personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.

Confidential

Perform research exploitation of adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources. Analyze collected data to derive facts, inferences, and projections concerning capabilities, intentions, attack approaches, and likelihood of various adversarial attacks under various situations. Research resource allocations, motivations, tendencies, personalities, and tolerance for detection, attribution and retribution that influence adversarial decisions. Contribute to profiling adversarial behavior with respect to identified system attacks in an operational mission context. Produce formal and informal reports, briefings, and perspectives of the behavior of adversaries against target systems, technologies, operations, and missions. Play a key role in the interpretation and exploitation of intelligence gathered from or about the enemy. Intelligence Analysts provide Army personnel with information about enemy forces and potential battle areas, and use information derived from all intelligence disciplines to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.

Confidential

Provide technical analyst in reference to automated system failures and query support agencies that are associated with Logistics Intelligence Files LIF , Logistics Support Activity LOGSA , Defense Automatic Addressing System DAAS , Gateway, Total Asset Visibility TAV , NALCOMIS, OOMA and Source of Supply SOS operations to enhance supply support.

Confidential

Responsible for a team of forensic exploitation research specialists in execution of a government intelligence agency mission. Direct and manage the work flow, performance, and discipline of 8-10 forensic intelligence and research technicians. Utilize my knowledge of law enforcement, forensic methods and best practices and work easily with both approaches to achieve successful forensic analysis. Recover and analyze fingerprint, DNA and trace evidence appropriately and upload into the RIDgE Data system for further research. Process a wide range of complex forensic intelligence associated with IEDs using advanced physical and chemical processes and light sources to include laser, alternate light source and reflected ultraviolet imaging system RUVIS . Maintain proper chain of custody and data integrity of all forensic intelligence extracted and queried. Conduct analyses and investigations of raw data collected by applying analytical and investigative methods. Plan, conduct, and adjudicate investigations to determine proper chain of custody prior to item transfer to FBI facility. Review and analyze suitability forms and applications to maintain and update the appropriate tacking and investigation systems. Conduct data checks, verification analysis, and prepare intelligence reports and statistical information. Maintain liaisons with other Federal, State, local, and private organizations or agencies. Provide detailed written documentation regarding the scientific investigations of examinations performed.

We'd love your feedback!