Experienced Network Forensic Analyst with a proven track record of success in incident response and digital forensics across diverse platforms (Windows, macOS, Linux, Cisco, Ubiquiti, and Fortigate). Adept at threat analysis, root-cause identification, and developing effective mitigation strategies to secure critical infrastructure and sensitive data.
Supporting CISA's Hunt and Incident Response Team (HIRT) Program. (Exact same role and team as the Zachary Piper Solutions position).
Conducting network forensic investigations on government and private sector critical infrastructure networks on an expeditionary incident response team. Analyzed incidents to determine root causes, develop mitigation strategies, and provide recommendations to the customer.
Completed diverse tasks incorporating data analysis, deciphering network packet and log data, identifying anomalies. Developed and tested machine learning models for automated threat detection and analysis within the incident response process.
NCOIC Cyber Threat Intelligence Training
426th Cyberspace Operations Squadron
08.2019 - Current
Actively working in Enterprise Network Defense and Cyber Threat Hunting. Conducting fusion analysis of cyber threats and providing actionable intelligence to customers. Building out custom detection methodologies for implementation in cybersecurity platforms such as Microsoft Defender.
Using Frameworks such as the MITRE ATT&CK Framework to write threat packages disseminated throughout several teams. Supporting a threat emulation team to perform internal penetration testing.
Developed and delivered training programs for all team members on procedures and best practices to enhance cyber threat intelligence gathering and analysis capabilities.
Network Forensic Analyst
Zachary Piper Solutions LLC
11.2022 - 10.2024
Supporting CISA's Hunt and Incident Response Team (HIRT) Program.
Conducting network forensic investigations on government and private sector critical infrastructure networks as a part of an expeditionary incident response team. Analyzing intrusion incidents and determining appropriate mitigation measures. Developing ML tools for use on incident response engagements.
Completed diverse tasks incorporating data analysis, deciphering network packet and log data, identifying anomalies. Implemented statistical and ML models to analyze network traffic. Utilized Splunk and ELK tools for analyzing enterprise logs, effectively decreasing average response time.
Digital Forensics Analyst
Cask Government Services
03.2022 - 10.2023
Supported Marine Corps Cyberspace Operations Group (MCCOG)'s Incident Response team
Conducting digital forensics investigations for the purposes for both internal and external reporting. Utilizing forensically sound equipment to maintain integrity of evidence. Performing incident response actions to include investigations, mitigation measures, and internal reporting. Maintaining forensic analysis environments and equipment to include forensic workstations, malware sandbox environments, writeblockers, and forensically sound drives
Recovered and analyzed digital evidence from various sources including systems, networks, Cloud, mobile devices and removable media with advanced digital forensic capabilities. Evaluated evidence, performed digital reconstruction, and validated findings
Generated reports that included technical detail gathered in the course of examinations and presented findings in a manner understandable to stakeholders and evidence reviewers
Education
Bachelor of Science - Computational and Data Science, Neuroscience
George Mason University
Fairfax, Virginia
01-2025
Associate of Science - Emergency Medical Technology
Tyler Junior College
Tyler, Texas
01.2019
Skills
Bash, PowerShell, Python, C, Rust
Splunk, Elastic (ELK Stack), Microsoft Defender, Microsoft Sentinel, Tanium