Summary
Overview
Work History
Education
Skills
Certification
Tools and Software
Timeline
Generic

Christopher Grundy

Springboro,OH

Summary

Analytical Technical professional seeking a career opportunity that will utilize both education and experience in a Threat Hunting, Threat Analyst, or Threat Intelligence Lead role. Team contributor with an outstanding work ethic complemented by strong organization/prioritization skills. Recognized as an excellent troubleshooter with impeccable attention to detail and proven ability to diagnose/resolve complex issues. Quick learner who is calm under pressure and adept at explaining technical issues in understandable terms.

Overview

18
18
years of professional experience
1
1
Certification

Work History

Senior Threat Analyst

Motorola Solutions Inc
10.2022 - Current
  • Create weekly, monthly, and quarterly threat intelligence reports
  • Provide Advanced Persistent Threat (APT) and campaign tracking as well as providing analysis on vulnerabilities to bring awareness to our customer base
  • Hunt for threats and anomalies in customer networks
  • Identified trends and patterns in large datasets, leading to actionable insights for business growth.
  • Collaborated with cross-functional teams to identify opportunities for process improvement and increased efficiency.
  • Enhanced network security by implementing robust intrusion detection and prevention systems
  • Trained employees on cybersecurity best practices, significantly reducing human error-related breaches

Cybersecurity Engineer - Threat Intelligence

Lunarline/Motorola Solutions Inc
04.2018 - 10.2022
  • Architecting, deploying, configuring, and supporting detection technologies
  • Containing and mitigating incidents involving critical and other support systems
  • Provide content creation and policy tuning for multiple security detection and alerting tools, including Carbon Black, Cortex XDR, and USM Anywhere
  • Responsible for installing, deploying and testing Carbon Black, Cortex XDR, and USM Anywhere
  • Assist Network Operations with developing secure system baseline Configurations
  • Subject Matter Expert on threat intelligence platform evaluation for creation of Vulnerability Management and Threat Assessment offering to the Public Safety sector


Lead Threat Intelligence Analyst

Bowhead Support
05.2019 - 03.2020
  • Oversees day-to-day operation and effectiveness of security-related programs and initiatives for a core hour Intelligence team in two locations
  • Plans project resources by developing shift and on-call schedules
  • Monitors analyst performance to ensure responsibilities and workloads are properly and evenly distributed
  • Creates Standard Operating Procedures (SOP's) for new and existing processes
  • Briefs executive management quarterly on key performance indicator (KPI) targets being achieved through the QA process
  • Briefs customer base bimonthly on priority incidents and upcoming initiatives
  • Regularly works with network defense and infrastructure management to ensure that processes and programs are in place for ongoing compliance
  • Maintains and manages the execution of an incident management process and the continuity of operations plan
  • Recommends hires, performance standards and reviews for intelligence team
  • Environment: Windows 10, Ubuntu, Bro IDS, McAfee HBSS, Elastic Search, Kibana

Threat Intelligence Analyst

Bowhead Support
05.2017 - 05.2019
  • Use Zeek/Bro IDS to collect, normalize, and characterize cyber incident and event data to identify malicious activity including intrusions, attacks, data loss or other prohibited activities
  • Continuous monitoring of the DREN (Defense Research & Engineering Network)
  • Analyze and correlate incidents and events that may involve foreign intelligence entities and warn of anticipated hostile attacks against DOD information systems or networks
  • Receive and analyze warning intelligence information and proper sharing of intelligence notifications, notes and reports with customers
  • Write alerters, based on intelligence, using Python
  • Environment: Windows 10, Ubuntu, Bro IDSy, McAfee HBSS, Elastic Search, Kibana

Military Police/Intelligence Analyst

United States Army
03.2006 - 10.2017
  • Commanded a team of 4 soldiers during combat operations in Iraq
  • Navigated over 5000 miles as a truck commander
  • Responsible for over $250,000 in equipment
  • Conducted over 200 combat patrols in Iraq
  • Validated 5 Iraqi Police Stations
  • Personally oversaw the Tikrit Main police station and prison.

Systems Engineer/Cybersecurity Liaison

Consulting Services Inc
09.2016 - 05.2017
  • Review audit logs
  • Assist security personnel in managing two-person integrity program
  • Review system security plans received from contractor locations
  • Desktop support for Special Access Programs (SAP) systems
  • In and out processing for all users within the directorate
  • Investigate Classified Material Incidents and Data Spillages
  • Environment: Windows 7, Windows 10, Active Directory Administrative Center, Microsoft Access 2013

Systems Administrator

Five Rivers Services LLC
03.2016 - 08.2016
  • BMC Remedy- Documentation purposes
  • Active Directory- Create, change, and delete user accounts per request
  • Granted permissions to users and groups
  • Shared resources such as printers, scanners, and storage
  • Exchange Server 2010- Created mailboxes and completed move requests
  • MAC Authentication Bypass- Configured MAB's and whitelisted/blacklisted on unclassified, classified, and centrix machines
  • Defense Enterprise Email Entitlement Manager- Created and provisioned user mailboxes
  • Created and added users to organizational mailboxes
  • Remote Desktop Connection
  • Environment: Windows Server 2008, Exchange Server 2010, Windows 7

Client Services Tech III

Consulting Services Inc/PAR Technology
10.2014 - 03.2016
  • Basic Technical Support- Supported over 500 users in a military environment
  • BMC Remedy- Added and resolved 20-25 tickets a day
  • Active Directory-Performed server management on Windows Server 2008
  • Granted user and computer access, shared resources such as printers, scanners, and storage
  • Printer Builds and Maintenance- Built and STIG'd printers from factory settings according to Air Force policy
  • Microsoft Office 2013
  • Environment: Windows Server 2008, Windows 7

Education

Bachelor of Science in Technical Management -

DeVry University
Dayton, OH
06.2025

Associate of Applied Science in Cyber Security & Forensics -

Fortis College
Centerville, OH
06.2013

Skills

  • Cyber Defense
  • Threat Intelligence
  • Report Writing
  • Threat Hunting
  • Detection Creation
  • Python Programming
  • EDR and SIEM Configuration/Administration

Certification

  • Active Top Secret/SCI Security Clearance
  • GIAC Certified Incident Handler (GCIH)
  • EC-Council Certified Ethical Hacker (CEH)
  • CompTIA A+
  • CompTIA Security+
  • CompTIA Server+
  • MTA: Networking Fundamentals

Tools and Software

  • Carbon Black
  • Cortex XDR
  • Crowdstrike
  • Microsoft Defender ATP
  • AlienVault USM Anywhere
  • Office 365
  • Tenable Nessus
  • Bro/Zeek

Timeline

Senior Threat Analyst

Motorola Solutions Inc
10.2022 - Current

Lead Threat Intelligence Analyst

Bowhead Support
05.2019 - 03.2020

Cybersecurity Engineer - Threat Intelligence

Lunarline/Motorola Solutions Inc
04.2018 - 10.2022

Threat Intelligence Analyst

Bowhead Support
05.2017 - 05.2019

Systems Engineer/Cybersecurity Liaison

Consulting Services Inc
09.2016 - 05.2017

Systems Administrator

Five Rivers Services LLC
03.2016 - 08.2016

Client Services Tech III

Consulting Services Inc/PAR Technology
10.2014 - 03.2016

Military Police/Intelligence Analyst

United States Army
03.2006 - 10.2017

Bachelor of Science in Technical Management -

DeVry University

Associate of Applied Science in Cyber Security & Forensics -

Fortis College
  • Active Top Secret/SCI Security Clearance
  • GIAC Certified Incident Handler (GCIH)
  • EC-Council Certified Ethical Hacker (CEH)
  • CompTIA A+
  • CompTIA Security+
  • CompTIA Server+
  • MTA: Networking Fundamentals
Christopher Grundy