Summary
Overview
Work History
Education
Skills
Professional Summary/Objective
Knowledge
Certification
Timeline
Generic

Timothy Elliott

Channahon,IL

Summary

Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures. Trusted Cyber Security Engineer with 2 years protecting companies against both internal and external threats. Talented at preemptively detecting unidentified threat vectors and applying preventive measures to mitigate security flaws. Employs technological solutions and personnel training to harden both people and machines against malicious actors.

Overview

3
3
years of professional experience
1
1
Certification

Work History

SSgt (Staff Sergeant), Cyber Warfare Operator

Cyber Operations - AF Reserve Command - Scott
10.2020 - Current
  • Conduct Incident Response in accordance with DOD policies and procedures of infected networks
  • Conduct Threat Hunting using MITRE ATT&CK
  • Collect and preserve data for further analysis to identify Tactics, Techniques, and Procedures (TTPs) used by adversaries
  • Identify Anomalous activity and investigate
  • Conduct network scouting and vulnerability analyses of systems within a network
  • Monitor, analyze, and evaluate system performance metrics to identify potential security threats
  • Identify potential points of strength and vulnerability within a network
  • Analyze packet captures from network traffic flows utilizing Wireshark or similar protocol analysis tools
  • Evaluate Event notification logs to identify Unauthorized access and compromise of systems
  • Apply forensic and reverse engineering TTPs to determine the extent of the damage sustained during cyberspace attacks
  • Provide Hardening recommendations to prevent future attacks

Education

Associate of Applied Science in Logistics -

Community College of the Air Force (CCAF)
08.2022

Bachelor of Science in Cloud Computing -

Western Governors University
04.2025

Cyber Warfare Operator School -

USAF (United States Air Force)
12.2022

Skills

  • IoT Security
  • Procedure Documentation
  • Disaster Recovery Planning
  • Network Security
  • Wireshark software
  • Intrusion Detection
  • Firewall Management
  • Threat Intelligence
  • Security Planning
  • Risk Assessment
  • Vulnerability Assessment

Professional Summary/Objective

Results-driven cybersecurity professional with 2 years of experience in identifying and mitigating security risks. Skilled in conducting threat assessments, identifying indicators of compromise, and clearing systems of infected software. Proven track record of implementing effective security measures to safeguard organizational assets. Seeking a challenging role in a dynamic environment to further enhance security posture and protect against evolving threats.

Knowledge

  • Python Programming (Entry-level)
  • Batch Scripting (Entry-level)
  • Network Vulnerability Scanning
  • Defensive Cyberspace Operations (Hunt, Clear, and Hardening Recommendations)
  • Analyzing Information and Preparing Technical Products and Time-Sensitive Reports
  • Monitoring System Operations and Reacting to Events in Response to Triggers and/or Observation of Trends or Unusual Activity
  • Performing Network Collection Tactics, Techniques, and Procedures, including Decryption Capabilities/Tools
  • Knowledge of Computer Networking Concepts and Protocols
  • Understanding of Network Security Methodologies
  • Knowledge of Enterprise-wide Information Management
  • Implementation of Unix and Windows Systems for:
  • Radius Authentication and Logging
  • DNS (Domain Name System)
  • Mail Services
  • Web Services
  • FTP Servers
  • DHCP (Dynamic Host Configuration Protocol)
  • Firewall Configuration
  • SNMP (Simple Network Management Protocol)
  • Methods and Techniques for Detecting Various Exploitation Activities
  • Structure, Approach, and Strategy of Exploitation Tools (e.g., sniffers, keyloggers) and Techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network)
  • Knowledge of Unix/Linux and Windows Operating Systems Structures and Internals (e.g., process management, directory structure, installed applications)

Certification

  • CompTIA Security+, CompTIA, 07/19/22
  • CompTIA A+ Core 1, CompTIA, 11/10/23
  • CompTIA A+ Core 2, CompTIA, 10/27/23
  • ITIL 4 Foundation Certificate in IT Service Management, PeopleCert / Axelos, 04/22/21

Timeline

SSgt (Staff Sergeant), Cyber Warfare Operator

Cyber Operations - AF Reserve Command - Scott
10.2020 - Current

Associate of Applied Science in Logistics -

Community College of the Air Force (CCAF)

Bachelor of Science in Cloud Computing -

Western Governors University

Cyber Warfare Operator School -

USAF (United States Air Force)
  • CompTIA Security+, CompTIA, 07/19/22
  • CompTIA A+ Core 1, CompTIA, 11/10/23
  • CompTIA A+ Core 2, CompTIA, 10/27/23
  • ITIL 4 Foundation Certificate in IT Service Management, PeopleCert / Axelos, 04/22/21
Timothy Elliott