Summary
Overview
Work History
Education
Skills
Education Training
Certification
References
Timeline
Generic

ERIC FENNER

Barboursville

Summary

Left-brained, protective, nerd with 18 years of experience delivering professional analysis. Skilled in problem identification and innovative solution development within fast-paced settings. Recent training in Data Science, Cyber Security, and OSINT techniques strengthens analytical capabilities. Focused on leveraging expertise to enhance operational efficiency and drive business success.

Overview

19
19
years of professional experience
1
1
Certification

Work History

Senior Cyber Threat Analyst

Cyber Analysis Support Services (CASS)
Charlottesville
07.2023 - Current
  • Provides cyber analysis of foreign threats to US ground force systems, combat support systems, and US operations
  • Identified a vulnerability in a U.S. Army system that would allow a breach based on the hardware used and adversarial intent to exploit
  • Worked with NATO personnel to create a quick-turn, high priority RFI response that was briefed to the EUCOM commander
  • Wrote and contributed to several NGIC whitepapers
  • Primary focus is on cyber infrastructure, military networks, and Advanced Persistent Threats (APTs)
  • Provides Government counterparts technical expertise on threats to US systems, to determine if a systems hardware or software is breached
  • Uses several tools to de-hash encoded text, associate IP addresses to cyber actors, identify Common Vulnerabilities and Exposures (CVE), and process structured data on APTs
  • Knowledgeable on communication network technologies, foreign ground forces systems, foreign threat capabilities, and cyber vulnerabilities (foreign and domestic)
  • Incorporates OSINT methodologies to support the entire CASS team; using a managed attribution Authentic8 SILO account
  • Uses OSINT for information on patents, Collateral Telemetry Data (CTD), breach data, removing paywalls, and deep/dark web analysis
  • Provide direct information technology (IT)/cybersecurity threat, vulnerability, and exploitation analysis and cyberspace intelligence support to operations for USINDOPACOM, USEUCOM, USTRANSCOM, USSPACECOM, USSOUTHCOM, USSOCOM, and CYBERCOM.
  • Provided new analytic line of production that directly supports the execution Defensive Cyberspace Operations and the development Operational Plans.
  • Lead analyst in producing an intelligence assessment to identifying gaps, policies, processes, roles, and responsibilities to align intelligence support to the Defensive Cyber Operations (DCO) mission; in direct support of the Cyber Pilot Study led by DIA, NSA, and CYBERCOM.
  • Lead analyst for a high priority requirement from USEUCOM and NATO HQs that directly lead to a special meeting with the office of the NATO Chief Information Officer (CIO) and will influence NATO cybersecurity policy in the future.
  • Provide direct support to Program Executive Office (PEO); developing products in support of critical intelligence parameters, production requirements, tabletop exercise support, and briefings.
  • Provide cybersecurity threat analysis support for all integrated APNT, microelectronics, network Information Technology (IT), and radio communication systems across all Army acquisition programs.

Senior All-source Analyst

Agile Analysis of Regional Threats (AART)
Charlottesville
09.2021 - 07.2023
  • Provide analytical support to multiple projects for the National Ground Intelligence Center (NGIC)
  • Led an emerging cyber-security mission that required analysis on the threats that Army forces may encounter; created a Cyber Threat Risk Calculator based off of the DODIN-RAM Framework
  • Project lead using data science techniques to analyze over 10 million locational pings
  • Project lead using CTD to identify militia activity, managing the product from start to finish, receiving accolades from internal and external customers, including SOF elements and the State Department
  • Learned multiple techniques to assist data scientists on how to condition and format all-source intelligence for machine language
  • Assisted the AART program on creating an analytic OneNote template for use on all projects, started the AART program training OneNote, took initiative to gain access to required programs, created a collaboration page for AART analysts, and provided IT support to colleagues during initial phases
  • Committed to learning new skills such as Python coding, SQL, and Jupyter notebook with the intention of incorporating machine learning and Artificial Intelligence (AI) into tradecraft

Senior Targeting Analyst

Counter Insurgency Targeting Program
Charlottesville
06.2016 - 09.2021
  • Completed over 550 targeting products to DoD customers
  • Proficient in all steps of the Intelligence Cycle and analytical methodologies that include Identity Intelligence (I2), target development, and target exploitation
  • Fills intelligence gaps with OSINT, SIGINT, HUMINT, MASINT, FABINT, IMINT, and CELLEX
  • Specializes in identifying threat signatures associated with social media activity, publicly available information (PAI), narcotics, explosives/switches, pattern of life, SIGINT activity, and biometrics
  • Trained extensively on the development of an OSINT research plan, using managed attribution accounts, a SILO account, VPNs, and dark web analysis
  • Functioned as the fusion lead for a multi-national targeting operation in Afghanistan
  • Co-authored multiple NGIC white papers, including the creation of advanced tradecraft techniques used to identify active threats in Afghanistan while supporting JSOCC/SOF
  • Influenced and impacted Afghanistan national targeting policy with an innovative method to prioritize targets that assisted senior staff, resulting in a new target prioritization method
  • Support to the Afghan regional team, Task Force, Weapons Technical Intelligence (WTI)/Device Attribution (DA) Teams, and NGICs science and technology branch

Staff Sergeant

U.S. ARMY
Pennsylvania
11.2006 - 11.2018
  • Relied heavily on PAI to provide the 56th Stryker brigade with operational level intelligence products
  • Monitored social media activity and news reports during the 2015 Pope visit to Philadelphia
  • Conducts intensive research and analysis from various sources of information with the purpose of creating a quality product for higher command
  • Proficient with technical programs such as: OneNote, PowerPoint, Excel, and Google Earth
  • Trained extensively in the field of route security, detainee operations, traffic control, and military law

Security Account Manager

SECURITAS
Allentown
12.2011 - 01.2016
  • Supported a force majeure program using ESRI; an analytical approach used to forecast potential negative impacts on any of the worldwide facilities, such as the tsunami that hit Japan in 2011
  • Saved a new tenant approximately $10,000 by reprogramming each door in the building to support the existing badges this company used, avoiding the need for a new security system
  • Lead a multi-national time sensitive project to create, ship, program, and activate approximately 20,000 badges for a business reorganization
  • Conducted cyber security operations by: monitoring access logs, controlling and monitoring user privileges, and using threat modeling techniques that provide the security team with adjustments
  • Pinged IP addresses to ensure hardware was operational throughout global sites
  • Managed contracts, negotiated pricing, issued purchase orders, and verified work for T&M projects

Education

Associates - Intelligence Analysis

Cochise College
04.2015

Bachelor of Science - Criminal Justice

Kutztown University
Kutztown, PA
12.2012

Skills

  • Open source intelligence
  • Technical writing
  • Critical thinking
  • Complex Problem-solving
  • Strong initiative, self-driven
  • Cybersecurity operations

Education Training

Kutztown University, Bachelor of Science in Criminal Justice, 12/12, Cochise College, Associates in Intelligence Analysis, 04/15, DAU | Cybersecurity & Resiliency for Weapons, Control and IT Systems, 2025, CompTIA | CySA+ (Cyber Security Analyst), expected date of completion 2025, OSINT 302, 07/22, OSINT 301, 06/22, CompTIA | Security+, 06/21, CASO Blackhorse Solutions | OSINT certification, 11/20, PAE | IED Electronics Course, 11/20, IBM | SQL for Data Science, 08/20, MIT | 6.002.1x: Circuits and Electronics 1 | Basic Circuit Analysis, 06/20, IBM | Applied Data Science Certification, 04/20

Certification

  • DAU | Cybersecurity & Resiliency for Weapons, Control and IT Systems | 2025
  • Salesforce | Sales and CRM Overview | Jul 2022
  • CompTIA | CySA+ (Cyber Security Analyst) | expected date of completion 2025
  • OSINT 302 | July 2022
  • OSINT 301 | June 2022
  • CompTIA | Security+ | June 2021
  • CASO Blackhorse Solutions | OSINT certification | November 2020
  • PAE | IED Electronics Course | November 2020
  • IBM | SQL for Data Science | August 2020
  • MIT | 6.002.1x: Circuits and Electronics 1 | Basic Circuit Analysis: June 2020
  • IBM | Applied Data Science Certification | April 2020

References

References available upon request.

Timeline

Senior Cyber Threat Analyst

Cyber Analysis Support Services (CASS)
07.2023 - Current

Senior All-source Analyst

Agile Analysis of Regional Threats (AART)
09.2021 - 07.2023

Senior Targeting Analyst

Counter Insurgency Targeting Program
06.2016 - 09.2021

Security Account Manager

SECURITAS
12.2011 - 01.2016

Staff Sergeant

U.S. ARMY
11.2006 - 11.2018

Associates - Intelligence Analysis

Cochise College

Bachelor of Science - Criminal Justice

Kutztown University