Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

COLIN MILLIGAN

Cyber Security Professional
Groveland

Summary

Dynamic Cyber Threat Hunter and Cloud Security Engineer with hands-on expertise in threat detection, adversary emulation, and vulnerability assessment across hybrid cloud and on-premise environments. Proven success leading proactive threat hunts, advanced penetration testing, and incident response operations to strengthen organizational security posture. Skilled at delivering technical findings and risk-based insights to both executive leadership and technical teams

Overview

10
10
years of professional experience
2
2
Certifications

Work History

Cyber Threat Hunter, Cloud Security Engineer

Bylight IT Professional Services LLC
08.2020 - Current
  • Led proactive cyber threat hunting and adversary emulation operations across hybrid environments, including Linux and Windows systems, to identify undetected malicious activity, credential abuse, and misconfigurations.
  • Developed and executed targeted penetration tests and threat emulation scenarios based on real-world TTPs to validate detection coverage, identify security gaps, and enhance response capabilities.
  • Authored and maintained detection logic aligned with MITRE ATT&CK to monitor for adversarial behaviors targeting Linux hosts, Windows endpoints, organizations, and cloud assets.
  • Produced detailed threat hunting, penetration testing, and incident reports with risk-based findings and remediation recommendations tailored for both technical teams and executive stakeholders.
  • Executed both red team operations and detection engineering efforts—building detection pipelines, automating alert enrichment, and performing threat emulation across Linux, Windows, and cloud environments to continuously improve detection coverage and reduce organizational attack surface.

Cyber Security Analyst Senior

Lockheed Martin
01.2019 - 08.2020
  • Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
  • Reduced risk of cyber attacks by conducting regular vulnerability assessments and penetration testing.
  • Enhanced network security by implementing advanced threat detection and prevention systems.
  • Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.

Information Security Analyst Senior

Pratt & Whitney
12.2016 - 01.2019
  • Collaborated with IT teams to integrate security best practices into system development and operations.
  • Developed comprehensive security policies, procedures, and training materials to strengthen organizational security posture.
  • Maintained compliance with industry standards such as JSIG, DAAPM, ISO 27001, and NIST by enforcing strict protocols and controls.
  • Designed secure networks by applying defense-in-depth principles that minimized attack surfaces while maintaining usability requirements for end users.
  • Reduced exposure to cyber threats by proactively monitoring the threat landscape for new risks or changes in tactics from adversaries.

IT Security Analyst

UTC Aerospace Systems
05.2016 - 12.2016
  • Performed regular audits of user access rights, ensuring only authorized personnel had access to sensitive information.
  • Collaborated with cross-functional teams to address complex security incidents, minimizing potential damage.
  • Worked closely with legal and compliance departments to ensure adherence to relevant regulatory requirements pertaining to data privacy and information security practices.
  • Managed firewall configurations to maintain optimal levels of network protection while allowing for necessary business operations.
  • Simplified the process of rolling out security updates to end-users by creating an easy-to-follow update schedule and corresponding documentation.

IT Security Analyst

Aetna
06.2015 - 05.2016
  • Performed regular audits of user access rights, ensuring only authorized personnel had access to sensitive information.
  • Provided comprehensive training to employees on cybersecurity awareness, promoting a culture of vigilance.
  • Spearheaded the development of an incident response plan, significantly reducing downtime in the event of a breach.
  • Identified areas requiring improvement through detailed analysis of past incidents, preventing future occurrences through targeted remediation efforts.
  • Established a robust patch management process that ensured timely updates to software and hardware components across the organization.

Education

Master of Science - Computer Science - Artificial Intelligence

Western Governors University
Salt Lake City, UT
05.2001 -

Master of Science - Cyber Security

University of Maryland Global Campus
Hyattsville, MD
05.2001 -

Bachelor of Science - Criminology

Central Connecticut State University
New Britain, CT
05.2001 -

Skills

Network security

Incident response

Vulnerability assessment

Penetration testing

Artificial intelligence security

Threat analysis

AWS

Open source security tools

Threat modeling

Cloud security architecture

Endpoint protection

Python

Certification

CompTia Security +

Timeline

EC-Council CEH

10-2024

CompTia Security +

03-2023

Cyber Threat Hunter, Cloud Security Engineer

Bylight IT Professional Services LLC
08.2020 - Current

Cyber Security Analyst Senior

Lockheed Martin
01.2019 - 08.2020

Information Security Analyst Senior

Pratt & Whitney
12.2016 - 01.2019

IT Security Analyst

UTC Aerospace Systems
05.2016 - 12.2016

IT Security Analyst

Aetna
06.2015 - 05.2016

Master of Science - Computer Science - Artificial Intelligence

Western Governors University
05.2001 -

Master of Science - Cyber Security

University of Maryland Global Campus
05.2001 -

Bachelor of Science - Criminology

Central Connecticut State University
05.2001 -
COLIN MILLIGANCyber Security Professional