Summary
Overview
Work History
Education
Skills
Websites
Hobbies and Interests
Timeline
Generic

Alexandra Lohmeyer

College Park,MD

Summary

Over six years of cyber and military analyst experience with an interest in using my Computer Science degree to augment detection and response to varied challenges. Accomplished Remediation Analyst with a proven track record in executing effective remediation plans and strategies, ensuring rapid response to security vulnerabilities. Cyber Extortion Threat Intelligence Analyst experienced in analyzing and mitigating cyber threats, delivering actionable insights to enhance security posture. Detail-oriented intelligence professional adept at collecting and processing information. Strategic and organized with excellent verbal and written communication skills. Willingness to take on added responsibilities to meet team goals. Looking to seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills.


Overview

9
9
years of professional experience

Work History

Counterintelligence Analyst 2

All Native Group
01.2025 - Current
  • Drove enhanced data collection against counterintelligence targets, developing collection requirements and providing feedback and evaluations to collectors.
  • Assessed counterintelligence operations, impacts on adversaries and mission goal achievement through critical analysis and teamwork.
  • Assessed foreign intelligence, international terrorist and technological collection threats directed against customer's personnel, resources, technology, facilities and programs.
  • Conducted comprehensive security reviews of SBIR/STTR proposals, assessing potential cyber threats, vulnerabilities, and impact on mission-critical systems within the proposed technology.
  • Analyzed technical architectures and data handling practices to identify potential security gaps and vulnerabilities in proposed solutions, including cloud-based environments.
  • Developed risk matrices to prioritize security concerns based on the likelihood and severity of potential threats, considering the unique challenges of emerging technologies.
  • Performed in-depth due diligence investigations on SBIR/STTR applicants, reviewing technical documentation, security policies, investment funding, and company hierarchy to assess overall risk profile.
  • Presented findings to stakeholders, including government funding agencies, clearly communicating complex technical risks and potential impacts on project success.

SCRM Cyber Researcher

Cherokee Federal
02.2024 - 11.2024
  • Demonstrated proficiency in utilizing SCRM to effectively manage customer certification data.
  • Possessed a comprehensive understanding of SCRM functionalities to guarantee optimal data management.
  • Provided ongoing support to colleagues, enabling them to effectively navigate SCRM for certification-related tasks.
  • Developed and maintained a robust knowledge base for certification creation procedures, ensuring consistency and reducing errors.
  • Stayed current with the latest SCRM updates and best practices through ongoing training and participation in professional communities.
  • Served as a subject matter expert (SME) on SCRM for certification management, providing guidance and support to internal teams.

Remediation Analyst

Rapid7
01.2023 - 08.2023
  • Operating collaboratively with cross-functional teams to effectively execute remediation plans and strategies, proactively addressing security vulnerabilities.
  • Continuously monitored and tracked remediation progress, delivering timely updates to management and clients, ensuring real-time transparency.
  • Contributing to the enhancement of vulnerability management processes, recommending, and implementing improvements to increase efficiency and effectiveness.

Cyber Extortion Threat Intelligence Analyst

Kivu Consulting
02.2022 - 12.2022
  • Skillfully negotiating ransoms with clients, consolidating diverse cyber threat feeds, conducting vigilant monitoring, assessing threats, and delivering actionable reports and recommendations for mitigation.
  • Conduct vigilant monitoring, assess threats, and deliver actionable reports and recommendations for mitigation.
  • Delivering reports and recommendations to businesses and clients to enable the effectiveness of mitigation and remediation efforts.
  • Consolidate diverse cyber threat feeds, enhancing situational awareness and supporting cybersecurity teams during incidents.
  • Providing threat intelligence support to cybersecurity teams during security incidents. Consistently negotiate ransoms on clients down by 50% or more.
  • Conducted detailed data analysis to identify patterns and trends in complex datasets.

Counter Insurgency Targeting Analyst

CACI International
10.2019 - 10.2021
  • Deployed to Iraq, collaborating with elite units including the 5th Special Forces Group, MARSOC, and ODA 5225 and 5335.
  • Serving as the Fusion Analyst for SOF 5th group, producing daily SITREPs and exploiting captured enemy material for target development.
  • Generating target and network profiles, maintaining intelligence databases for foreign mission support in Afghanistan, Syria, and Iraq.
  • Recommended products that met customer needs, emphasizing quality and usefulness.
  • Created useful and timely intelligence products to support field operations.
  • Produced multi-source intelligence reports and products for different agency customers.
  • Developed recommendations to assist clients and agencies with efforts to advance intelligence gathering and interpretation in multiple theaters of operation.
  • Coordinated with other intelligence agencies to share information and resources.
  • Conducted detailed data analysis to identify patterns and trends in complex datasets.
  • Proven ability to learn quickly and adapt to new situations.
  • Demonstrated a high level of initiative and creativity while tackling difficult tasks.
  • Used strong analytical and problem-solving skills to develop effective solutions for challenging situations.

35F All Source Intelligence Analyst

US Army
11.2016 - 11.2022
  • Company Overview: Providing essential support to Operation Resolute Support in Afghanistan.
  • Providing essential support to Operation Resolute Support in Afghanistan by actively collaborating with a battalion-level S2 shop and a General Staff level G2, ensuring critical intelligence coordination.
  • Demonstrating proficiency in applying advanced intelligence analysis techniques to systematically uncover, assess, interpret, and report on potential security risks.
  • Producing comprehensive long-form intelligence reports and regular daily and weekly intelligence summaries for a designated operational zone, ensuring timely and relevant insights for decision-makers.
  • Preparing intelligence reports and maintaining and establishing intelligence records and files.
  • Determining how reliable and significant incoming intelligence information might be.
  • Putting new data in context with existing intelligence so that commanders and agents have the most up-to-date information possible.
  • Analyzed open-source intelligence data to identify potential threats and vulnerabilities.
  • Conducted threat assessment and analysis of foreign adversaries in support of military operations.
  • Briefed upper-level personnel on emerging threats.
  • Utilized intelligence collection platforms and analysis techniques to identify and document intelligence gaps.
  • Used counterintelligence, human intelligence and signal intelligence techniques to thoroughly analyze data.
  • Providing essential support to Operation Resolute Support in Afghanistan.

Education

Security+ 701 - Information Security

CompTIA
College Park, MD
08.2027

Bachelors - Computer Science and Information Security

American InterContinental University
Atlanta, GA
12.2022

Skills

  • Flashpoint
  • ArcGIS
  • ArcMap
  • Analyst Notebook (i2)
  • Dataminr
  • Microsoft Power BI
  • All-source intelligence
  • Regional analysis
  • Analytical products
  • Intelligence databases
  • Geographic information systems (GIS)
  • Artificial intelligence tools
  • Signals intelligence
  • Imagery intelligence
  • Measurement and signature intelligence
  • Human intelligence
  • Open-source intelligence
  • Geospatial intelligence
  • Collaboration
  • Information sharing
  • Intelligence activities coordination
  • Threat identification
  • Illicit organization disruption
  • Information gathering
  • Aerial photographs
  • Radar equipment
  • Sensitive radio equipment
  • Threat research
  • Threat group definition
  • Knowledge base updating
  • Database updating

Hobbies and Interests

  • I love exotic and wild pets. At this point I have a macaw, a cat, a horse, two pythons, and a leopard gecko.
  • Rock climbing is a recent interest and I had the opportunity to climb at Yosemite, which was a blast.
  • Horror movies have been a consistent passion, though I feel like there haven't been many out lately that have been very good.
  • It is my personal goal to play every dinosaur video game ever created.

Timeline

Counterintelligence Analyst 2

All Native Group
01.2025 - Current

SCRM Cyber Researcher

Cherokee Federal
02.2024 - 11.2024

Remediation Analyst

Rapid7
01.2023 - 08.2023

Cyber Extortion Threat Intelligence Analyst

Kivu Consulting
02.2022 - 12.2022

Counter Insurgency Targeting Analyst

CACI International
10.2019 - 10.2021

35F All Source Intelligence Analyst

US Army
11.2016 - 11.2022

Bachelors - Computer Science and Information Security

American InterContinental University

Security+ 701 - Information Security

CompTIA
Alexandra Lohmeyer