Accomplished Intelligence Specialist with extensive experience at the Department of Homeland Security. Expert in threat assessment and intelligence analysis, leveraging top secret clearance to enhance national security. Proven track record in developing training programs and fostering team collaboration, resulting in a 30% improvement in operational efficiency. Skilled in policy writing and effective communication.
Overview
39
39
years of professional experience
1
1
Certification
Work History
Intelligence Specialist
Department of Homeland Security
Washington
10.2024 - Current
Managed sensitive information while ensuring compliance with privacy regulations.
Reviewed technical documents such as manuals, policies, regulations, and directives pertaining to intelligence operations.
Evaluated existing processes related to the management of confidential information in order to identify areas needing improvement.
Intelligence Specialist
Department of the Army
Honolulu
07.2020 - 10.2024
Analyzed intelligence reports to support national security operations.
Conducted threat assessments to identify potential risks and vulnerabilities.
Developed training materials for staff on intelligence gathering techniques.
Prepared briefings and presentations for senior officials on key findings.
Managed sensitive information while ensuring compliance with privacy regulations.
Reviewed and evaluated intelligence data to enhance operational effectiveness.
Identified opportunities for intelligence collection operations and coordinated with relevant stakeholders.
Provided timely briefings on current events to senior leadership regarding threat landscapes.
Assessed the accuracy of incoming reports from external sources prior to their dissemination throughout the organization.
Developed comprehensive assessments of potential threats and vulnerabilities.
Provided guidance and support to junior personnel responsible for conducting various types of surveillance activities.
Created databases to store collected intelligence data and facilitate its retrieval when needed.
Conducted research and analysis of intelligence data to identify trends and patterns.
Gathered information from multiple sources, including open-source materials, to provide detailed reports.
Maintained a secure environment within which sensitive data can be stored securely without risk of compromise.
Established protocols for disseminating actionable intelligence information in a timely manner among appropriate parties.
Participated in meetings with other agencies to discuss methods for sharing intelligence information.
Assisted in developing strategies for responding to emerging threats based on available evidence.
Compiled daily reports on significant developments in the intelligence field for review by supervisors.
Coordinated with other agencies in order to ensure that all available resources are being used effectively during investigations.
Provided real-time incident reporting to internal members and clients on threats to key sectors.
Conducted and supported analysis of information operations (IO) intelligence related to political, economic, social, cultural, physical, geographic, technical or military issues in specific foreign countries.
Supported operational planning and execution of intelligence operations (IO) and military information support operations (MISO).
Checked clearances and eligibility of many personnel each quarter.
Collected, reviewed and processed intelligence information for senior personnel.
Prepared briefs and intelligence presentations and disseminated to appropriate stakeholders.
Developed and distributed intelligence products focused on field operations.
Determined connections between criminal activities by linking suspects.
Identified potential and existing threats and vulnerabilities.
Gathered and disseminated raw intelligence for real-time analysis and decision-making.
Intelligence Specialist
Defense Forensics and Biometrics Agency (DFBA)
Arlington
05.2016 - 07.2020
Analyzed intelligence reports to support national security operations.
Collaborated with law enforcement agencies for information sharing and coordination.
Developed training materials for staff on intelligence gathering techniques.
Prepared briefings and presentations for senior officials on key findings.
Managed sensitive information while ensuring compliance with privacy regulations.
Assisted in the implementation of intelligence systems and tools for analysis.
Identified opportunities for intelligence collection operations and coordinated with relevant stakeholders.
Provided timely briefings on current events to senior leadership regarding threat landscapes.
Reviewed technical documents such as manuals, policies, regulations, and directives pertaining to intelligence operations.
Monitored the implementation of strategic plans related to intelligence gathering activities.
Evaluated existing processes related to the management of confidential information in order to identify areas needing improvement.
Established protocols for disseminating actionable intelligence information in a timely manner among appropriate parties.
Produced documents outlining procedures for collecting, analyzing, and reporting on classified material.
Participated in meetings with other agencies to discuss methods for sharing intelligence information.
Assisted in developing strategies for responding to emerging threats based on available evidence.
Coordinated with other agencies in order to ensure that all available resources are being used effectively during investigations.
Conducted and supported analysis of information operations (IO) intelligence related to political, economic, social, cultural, physical, geographic, technical or military issues in specific foreign countries.
Checked clearances and eligibility of many personnel each quarter.
Prepared briefs and intelligence presentations and disseminated to appropriate stakeholders.
Developed and distributed intelligence products focused on field operations.
Determined connections between criminal activities by linking suspects.
Gathered and disseminated raw intelligence for real-time analysis and decision-making.
Investigated criminal assets to identify money flows to and from targeted groups.
Weapons and Technical Intelligence Senior Analyst
Six Three Systems
Charlottesville
05.2009 - 05.2016
Analyzed data trends to inform decision-making processes.
Collaborated with cross-functional teams on project initiatives.
Developed reports utilizing data visualization tools for insights.
Mentored junior analysts in data interpretation and analysis techniques.
Streamlined processes to enhance operational efficiency and accuracy.
Implemented best practices for data management and quality assurance.
Developed training materials for end users.
Conducted extensive research into industry trends and competitive analysis.
Analyzed and tracked data to prepare forecasts and identify trends.
Identified needs of customers promptly and efficiently.
Provided technical support for existing reports, dashboards or other tools.
Disseminated information regarding tools, reports or metadata enhancements.
Cryptologic Technician (Collection)
US Navy
Honolulu
12.1986 - 05.2009
Analyzed signals to identify and collect intelligence data.
Operated advanced collection systems to gather cryptographic information.
Collaborated with teams to assess and prioritize collection requirements.
Translated complex data into actionable intelligence reports.
Provided training and mentorship to junior technicians on operational procedures.
Conducted thorough evaluations of collected data for accuracy and relevance.
Coordinated efforts with other intelligence agencies for information sharing.
Developed and maintained documentation for collection processes and protocols.
Generated detailed reports outlining findings from intercepts conducted during missions.
Troubleshot hardware problems with cryptologic systems when necessary.
Analyzed message traffic for trends or patterns that could indicate hostile intent or operations planning activities.
Participated in exercises designed to simulate real-world scenarios involving cryptology.
Gathered information from multiple sources to create comprehensive intelligence briefings.
Developed and implemented procedures to collect, analyze, and report on intercepted communications.
Updated databases with newly acquired information about foreign communication networks.
Implemented countermeasures against potential threats identified through signal analysis techniques.
Conducted technical analysis of voice, data and other signals using specialized computer systems and software.
Identified and reported anomalies in communications networks to alert commanders of potential threats.
Provided training on the use of cryptologic systems to personnel in a variety of settings.
Utilized geospatial tools such as Google Earth Pro for mapping out communication networks.
Monitored communication channels for intelligence gathering purposes.
Performed quality control checks on collected data prior to its submission up the chain of command.
Operated radio direction-finding equipment to detect enemy transmissions.
Maintained records of activity reports for mission tracking purposes.
Documented notes of work assignments for reports.
Employed dedicated equipment to test security and signal strength of networks, servers and equipment.
Protected privacy by keeping confidential information secret.
Developed and employed security measures to maintain safe networks and devices.
Performed inspections to keep equipment in working order.
Used technical expertise and sound military judgment to learn and perform complex procedures.
Responded immediately to routine and critical accidents, incidents and other emergencies.
Conducted training to improve troops' abilities.
Provided precision to carry out increasingly complex missions.
Planned and conducted tactical and assault support missions.
Operated, monitored and performed limited maintenance on mission-critical systems.
Operated surveillance, electronic warfare and other weapon systems.
Reviewed mission tasking, intelligence and weather information.
Targeted, fired and maintained weapons used to destroy enemy positions.
Assisted in development of weapons and tactics.
Managed personnel and weapons operations to destroy enemy positions, aircraft and vessels.
Secured and protected air, land and sea positions from enemy attack.
Abstracted key environmental information to employ wide range of high-tech systems and weaponry.
Loaded, equipped and manned aircraft for mission.
Leveraged guns, cannons and howitzers in ground combat operations.
Launched torpedoes and missiles from ship or submarine.
Education
Master of Science - Cyber Security Policy
University of Maryland Global Campus
Hyattsville, MD
12-2011
Bachelor of Science - Political Science And Government
University of Maryland Global Campus
Hyattsville, MD
06-2009
Skills
Threat assessment
Intelligence analysis
Policy writing
Data management
Technical documentation
Information sharing
Critical thinking
Situational awareness
Project management
Risk evaluation
Effective communication
Team collaboration
Training development
Problem solving
Attention to detail
Information security
Intelligence collection
Signal intelligence
Cultural awareness
Research
Data collection
Compliance risk management
Cross-cultural design
Coordinating travel
Intelligence assessments
Collaborative mindset
Standardizing procedures
Report writing
Verbal, interpersonal, and written communication
Managing records
Policy review
Report preparation
Providing briefings
Security enhancement
Quality standards
Conducting briefings
Maintaining records
Counterterrorism expertise
Incident reporting
Security clearance procedures
Data evaluation
Top secret clearance
Crime trend analysis
Risk analysis
Mitigation strategy development
Predictive analyses
Intelligence products
Threat detection
Data interpretation
Information verification
Intelligence gathering
Possess TS/SCI Security Clearance
Updating tracking spreadsheets
Research and analysis
Team player
Information gathering
Geopolitical awareness
Superior interpersonal skills
National security
Certification
Certified Knowledge Management (CKM)
Affiliations
Active in supporting my church various fund raising activities.
Enjoy live sporting events
Bicycling
Hiking
Horseback Riding
Accomplishments
Created a Collection Capability while stationed at Navy Information Operations Command San Antonio Texas. This enhanced collected information on a US Southern Command Priority Topic.
Chosen over 35 other personnel to be the US Central Command Afghanistan in-theater Subject Matter Advisor on Forensic Analytical Laboratories including locations best suited to support Afghanistan Operations for Joint Forces.
References
References available upon request.
Timeline
Intelligence Specialist
Department of Homeland Security
10.2024 - Current
Intelligence Specialist
Department of the Army
07.2020 - 10.2024
Intelligence Specialist
Defense Forensics and Biometrics Agency (DFBA)
05.2016 - 07.2020
Weapons and Technical Intelligence Senior Analyst
Six Three Systems
05.2009 - 05.2016
Cryptologic Technician (Collection)
US Navy
12.1986 - 05.2009
Master of Science - Cyber Security Policy
University of Maryland Global Campus
Bachelor of Science - Political Science And Government
Intern at Department of Homeland Security (Homeland Security Investigations)Intern at Department of Homeland Security (Homeland Security Investigations)
IT Cybersecurity Specialist & Program Manager at Department of Homeland Security (DHS) | Cybersecurity and Infrastructure Security Agency (CISA) | Cybersecurity Division (CSD)IT Cybersecurity Specialist & Program Manager at Department of Homeland Security (DHS) | Cybersecurity and Infrastructure Security Agency (CISA) | Cybersecurity Division (CSD)
Chief of Staff at Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Human RescourcesChief of Staff at Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Human Rescources
Branch Chief, Emergency Communications Division at Cybersecurity and Infrastructure Security Agency (CISA), U.S. Department of Homeland SecurityBranch Chief, Emergency Communications Division at Cybersecurity and Infrastructure Security Agency (CISA), U.S. Department of Homeland Security