Summary
Overview
Work History
Education
Skills
Websites
Certification
Hobbies and Interests
Timeline
Generic

JACKSON WELLS

DALLAS,TX

Summary

Cybersecurity professional with a strong focus on automation, integration, and workflow optimization. Experienced across both defensive and offensive security domains, with hands-on involvement in detection engineering, incident response, threat emulation, and control validation. Proven ability to drive efficiency and performance through technical automation, while fostering strong communication and collaboration within and across teams. Known for streamlining security operations and building solutions that enhance visibility, reduce response time, and improve overall team effectiveness.

Overview

11
11
years of professional experience
1
1
Certification

Work History

Breach and Attack Simulation Lead

Toyota
03.2024 - Current
  • Build and manage a Breach and Attack Simulation Program to continuously validate security tooling across Toyota resulting in improved security structure and timely identification of security drift.
  • Automate offensive attack emulations to be ran ad-hoc or on a schedule to consistently validate security tool's responsiveness to threats of interest
  • Coordinate with various teams such as Security Operation Center, Threat Detection Engineering, IAM, and others to ensure remediation steps are understood and implemented accordingly to critical findings.
  • Operate a pipeline of automated alert resolution and correlation through the use of workflow automation tools and custom python scripting
  • Perform routine password audits through a customized scripting workflow allowing us to identify and notify users and service account holders with poor passwords

Senior Red Team Operator

T. Rowe Price
12.2022 - 03.2024
  • Research, plan, execute, and debrief on highly evasive Red Team operations through threat actor emulation and Purple Team operations through team collaboration and tactic and technique alignment
  • Use Security tools such as: Cobalt Strike, Burp Suite, OutFlank, Nessus, Open Source C2s, Mimikatz, Impacket, and many more..
  • Execute penetration tests on network based business objects for various teams and organizations
  • Continuously validate security controls with Breach and Attack software
  • Thoroughly communicate findings and security risks to various departments
  • Stay up to date with modern threat actors tactics, techniques, and procedures

Solutions Engineer

AttackIQ
12.2021 - 12.2022
  • Create simulated attacks for the AttackIQ Scenario Library based on techniques aligned with MITRE ATT&CK
  • Help customers utilize AttackIQ's Breach and Attack Simulation software by guiding them to test more effectively with a threat informed defense
  • Content creator for AttackIQ Academy
  • Build python scripts for customers based on the AttackIQ API

Lead Detection Engineer

Critical Start
09.2020 - 12.2021
  • Lead Detection Engineering team along side a Cyber Threat Intelligence team to ensure customers are getting timely detections based on threat actors applicable to them
  • Familiarization with various EDRs, SIEMs, and Firewall's for detection creation
  • Maintain a detection repository through Git versioning
  • Train Security Analysts on new detections by first explaining what attacks are prevalent, and how X,Y, and Z detection can help detect/prevent

Senior Security Analyst

Critical Start
05.2018 - 09.2020
  • Lead team of Security Analysts on how to best triage security alerts
  • Mentor junior analysts on technical and leadership growth
  • Demonstrate our security platform to other customers
  • Review Critical Alerts with customers to help them understand and triage quickly
  • Monitor security alerts and take action to call, quarantine, or isolate endpoints/identities if deemed malicious

Information Systems Technician

US Navy
06.2014 - 06.2018
  • Worked on small LANs, switches, printers, endpoint configuration
  • Performed Funeral Duty honoring Sailors who lost their lives during or after service
  • Assisted in the base's Auxiliary Security Force
  • Led portion of my duty station as a Second Class Petty Officer

Education

Computer Studies -

UNIVERSITY OF MARYLAND GLOBAL CAMPUS
01.2017

Skills

  • Automating & Integrating tools
  • Python and C/C programming
  • Inner & cross-team communication
  • Analytical problem solver
  • Quickly adjusting to change
  • Breach and Attack Simulation
  • Proficient with Linux/Unix/Windows
  • Workflow optimization

Certification

  • Offensive Security Certified Professional (OSCP) 2020-02
  • Certified Red Team Operator (CRTO) 2023-06
  • CompTIA Advanced Security Practitioner (CASP) 2017-11
  • Practical Network Penetration Tester (PNPT) 2021-12

Hobbies and Interests

Sports (Specficially Dallas Cowboys) 

Guitar player of 18+ years

Staying active working out/hiking 

Social beer drinker

Timeline

Breach and Attack Simulation Lead

Toyota
03.2024 - Current

Senior Red Team Operator

T. Rowe Price
12.2022 - 03.2024

Solutions Engineer

AttackIQ
12.2021 - 12.2022

Lead Detection Engineer

Critical Start
09.2020 - 12.2021

Senior Security Analyst

Critical Start
05.2018 - 09.2020

Information Systems Technician

US Navy
06.2014 - 06.2018

Computer Studies -

UNIVERSITY OF MARYLAND GLOBAL CAMPUS