Summary
Overview
Work History
Education
Skills
Certification
Interests
BusinessAnalyst

Jonathan Sparkman

Summary

Adept Cyber Operations Planner and Red Team Operator with a proven track record at the USAF, leading over 200 cyber operations and developing critical cyber target profiles. Skilled in ethical hacking and teamwork, I significantly enhanced joint warfighter readiness and supported pivotal cyber strikes, showcasing unparalleled self-motivation and technical expertise.

Tech-savvy innovator with hands-on experience in emerging technologies and passion for continuous improvement. Skilled in identifying opportunities for technological enhancements and implementing effective solutions. Adept at leveraging new tools and methods to solve problems and enhance productivity. Excels in adapting to fast-paced environments and driving technological advancements.

Overview

19
19
years of professional experience
3
3
Certification

Work History

Cyber Operations Planner

USAF
10.2016 - 11.2017
  • Spearheaded 216 United States Forces Korea (USFK) cyber fires, leading precision time/tempo execution and integrating non-kinetic operations in the decision-making loop, a first in the Korean Theater of Operations (KTO).
  • Directed 96 cyber strikes during the first-ever bilateral cyber live-fire exercise, synchronized operations across three Combatant Commands (COCOMs), supporting 112 hours of cyber effects.
  • Developed key cyber target profiles, identified critical nodes for Combined Forces Air Component Commander (CFACC) missions, and executed 324 offensive cyber strikes, directly supporting 24 Air Tasking Orders (ATO) and 75,000 coalition personnel.

Red Team Operator

USAF
09.2013 - 10.2016
  • Contributed as a member of the network warfare operations team during Red Flag 15-1, where enemy cyber defense tactics and techniques (TTPs) were replicated, successfully preparing 3,000 joint warfighters for integrated operations in a dynamic cyber environment.
  • Configured the exercise network for Cyber Flag 15-1, delivering comprehensive training to both joint and coalition personnel, ensuring 600 warfighters were fully prepared for cyber operations in contested environments.
  • Emulated adversary information operations (IO) during Red Flag 14-3, completing 42 objectives that significantly enhanced the readiness of 2,400 joint personnel, effectively training them to combat complex IO threats.
  • Led a mobile opposing force (OPFOR) team in Green Flag 14-8, integrating targets in a contested cyber domain and preparing 2,800 joint personnel for real-time cyber and information operations scenarios.

Education

Associate of Applied Science - Cybersecurity

Community College of The Air Force
Maxwell AFB, AL
01-2017

Skills

  • Demand forecasting
  • Teamwork
  • Self motivation
  • C, C, Rust, and Python programming
  • Bash, Powershell, and Python Scripting
  • Network Troubleshooting Abilities
  • Ethical Hacking
  • Malware analysis
  • Incident response
  • Security information and event management
  • Reverse engineering
  • Multitasking Abilities

Certification

  • GIAC Reverse Engineering Malware Certification (GREM) Jan 2024
  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) November 2019
  • GIAC Certified Incident Handler Certification (GCIH) September 2013


Interests

  • Coding and Programming
  • Robotics
  • Designing and Printing 3D Models
  • Developing software, websites, and apps in various programming languages
  • Video Gaming
  • Electronics and Circuit Building
  • Tech enthusiast, passionate about exploring the latest advancements and innovations
Jonathan Sparkman