Summary
Overview
Work History
Education
Skills
Certification
Timeline
background-images

Jessica Vaughn

Laurel,MD

Summary

Cybersecurity Analyst with 6 years of experience in network security, threat intelligence, and incident response. Expertise in Security Operations Center (SOC) functions, SIEM tools (Security Onion, Splunk), and threat hunting using the MITRE ATT&CK framework. Strong background in continuous monitoring, intelligence analysis, and technical report writing for leadership. Proven ability to design and automate the build of secure infrastructure used for incident response investigations. Led three large-scale Hunt Forward Operations with the Cyber National Mission Force (CNMF) as the technical lead and senior network/host analyst. Recognized as a distinguished leader within the Army, awarded two Army Achievement Medals (AAMs) and one Army Commendation Medal (ARCOM). Currently engaged in Hiring Our Heroes with Google, focusing on automation with Python.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Master Gunner - Infrastructure & Automation Specialist

United States Army Cyber Command
01.2021 - Current
  • Designed and built mission-critical cybersecurity kits for operational deployments.
  • Automated security configurations and infrastructure deployment using Ansible.
  • Conducted technical analysis and rewired infrastructure to improve cybersecurity resilience.
  • Ensured protective security measures were in place for mission-critical systems.

Senior Cybersecurity Analyst - Network & Host Analyst

United States Army Cyber Command
01.2019 - Current
  • Conducted network traffic analysis to detect and mitigate cyber threats.
  • Investigated threat intelligence sources to proactively identify emerging adversarial tactics.
  • Customized SIEM tools (Security Onion, Splunk) to filter and analyze large data sets.
  • Led three large-scale Hunt Forward Operations as a tech lead and senior network host analyst.
  • Performed host-based analysis on Linux and Windows systems to detect malicious activity.
  • Developed and deployed SOC monitoring dashboards to enhance situational awareness.
  • Utilized continuous monitoring techniques to detect anomalies and improve security posture.
  • Conducted incident response activities, including forensic analysis and mitigation strategies.
  • Provided technical briefings and reports to senior leadership on cybersecurity findings.
  • Supervised a crew of cybersecurity professionals, providing mentorship, leadership, and training to help them excel in their Army careers and technical expertise.

Education

Bachelor's Degree - Chemistry

University of West Florida

Master's Degree - Cybersecurity

SANS University
10.2025

Skills

  • Security Onion
  • Splunk
  • Network traffic analysis
  • Intrusion detection
  • Conducting threat analysis
  • Identifying adversary tactics
  • Continuous monitoring
  • Host-based analysis (Windows & Linux)
  • Malware analysis
  • Threat detection
  • Ansible Automation
  • Bash Scripting
  • Python programming
  • System hardening
  • MITRE ATT&CK
  • NIST
  • Network protocols
  • Packet analysis
  • Digital forensics
  • Infrastructure Design and system hardening

Certification

  • CISSP - Certified Information System Security Professional
  • CCNA - Certified Cisco Networking Associate
  • CYSA+ - Cyber Security Analyst
  • Security+ - CompTIA Security+
  • IT Automation with Python - Google Career Certificate

Timeline

Master Gunner - Infrastructure & Automation Specialist

United States Army Cyber Command
01.2021 - Current

Senior Cybersecurity Analyst - Network & Host Analyst

United States Army Cyber Command
01.2019 - Current

Master's Degree - Cybersecurity

SANS University

Bachelor's Degree - Chemistry

University of West Florida
Jessica Vaughn