Summary
Overview
Work History
Education
Skills
Affiliations
Certification
Languages
Timeline
Awards
Generic

Yatniel Acevedo

N. Las Vegas

Summary

Dynamic cybersecurity professional with over 20 years of experience in safeguarding critical information systems and mitigating potential threats. Recognized for a collaborative approach to problem-solving and delivering impactful results within large, fast-paced environments. Specialized expertise includes digital forensics, incident response, data recovery, threat detection, vulnerability assessment, and compliance, with a proven ability to support law enforcement and intelligence operations as well as corporate cybersecurity initiatives. Adept at identifying and addressing cybersecurity threats to protect sensitive data while implementing robust incident response strategies aligned with industry standards.

Overview

21
21
years of professional experience
12
12
Certification

Work History

Principal Cyber Security Analyst

MSTS, DoE/NNSS
01.2023 - Current
  • Monitored and responded to complex cybersecurity related incidents within the MSTS/NNSS information system environment incorporating over 8K servers/endpoints.
  • Analyzed security incidents to identify vulnerabilities and recommend mitigation strategies.
  • Developed and implemented DFIR process, playbooks risk assessment protocols to enhance organizational cybersecurity posture.
  • Collaborated with cross-functional teams to address cybersecurity gaps, vulnerabilities and ensure compliance with federal cybersecurity regulations.
  • Conducted comprehensive audits of security systems to ensure effective threat detection and response measures.
  • Mentored junior analysts in cybersecurity best practices and incident response procedures.
  • Evaluated emerging technologies for potential integration into existing security frameworks.
  • Prepared detailed reports on security assessments and presented findings to senior management for strategic planning.
  • Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
  • Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.
  • Performed regular reviews of user behavioral data and access rights, minimizing risks posed by potential insider threats or compromised accounts.
  • Optimized security tool posture and monitoring processes by implementing best practices and automation for real-time threat detection and analysis.
  • Ensured compliance with government oversight policies by regularly performing performance testing on existing security tools, policies and procedures.
  • Performed cybersecurity awareness sessions and phishing awareness campaigns to increasing staff vigilance against phishing and social engineering attacks.
  • Leveraged cutting-edge cybersecurity tools and technologies such as; Crowdstrike, Splunk, Forescout, Varonis, Panaroma, FireSight, SkyHigh and Prisma for continuous monitoring and protection of IT infrastructure.
  • Optimized incident response times by continually developing, improving and implementing streamlined process for handling security breaches.

Digital Forensic Incident Response Consultant

Optiv Security, Inc.
11.2021 - 11.2022
  • Conducted live incident response and forensic investigations, compromise assessments, system triage, containment, remediation and recovery efforts for various clients.
  • Leverage numerous digital forensic and command line-based tools to capture, process, examine and analyze data for evidence of malicious activity or indicators of compromise.
  • Utilized SIEM, EDR and XDR solutions to capture and analyze relevant logs and network traffic for indicators of compromise (IoC).
  • Conduct remote and on-site proactive incident preparedness engagements to include Incident Response Plans, Playbooks, Vulnerability Assessments, and Tablet Top Exercises.
  • Perform incident management consultation to lead customer personnel in responding to fast paced incidents.
  • Generate and maintain detailed case notes to accurately identify and describe IoCs, vulnerabilities, and all relevant incident findings.
  • Produce technical and executive summary reports that capture all incident investigation findings, observed attack TTPs and other IoCs and provide standard remediation based on observed activity and vulnerabilities.
  • Collaborated with stakeholders to define project scopes, objectives, and success criteria for security initiatives.
  • Developed comprehensive reports detailing findings, recommendations, and action plans for clients' security posture.
  • Liaised with customers, management, and sales team to better understand customer needs and recommend appropriate solutions.
  • Collaborated with cross-functional teams to successfully deliver comprehensive solutions for clients.
  • Analyzed client infrastructures to identify vulnerabilities and recommend strategic improvements.

Sr Digital Forensic Analyst | Liaison (GS-13)

DHS HQ Intelligence & Analysis
03.2017 - 11.2021
  • Performed all phases of digital forensic and incidence response functions supporting criminal law enforcement and proprietary theft investigations and DHS endpoint/network cyber-security incident response efforts, including collection and processing of computer, mobile, storage media, and the examination and analysis of all pertinent content and artifacts.
  • Served as acting Digital Forensics Team Lead, oversaw day to day operations and execution of tasks; attended management meetings, participated in customer engagements; planned and coordinate field operations; and provide recommendations and consultation on resources, capabilities, potential gaps.
  • Served as Liaison Officer (LNO) for the Northeast field team; acted as the primary point of contact, fostering strong relationships between internal teams and external partners.
  • Facilitated communication between departments to enhance project collaboration and operational efficiency.
  • Planned and participated in large-scale domestic and foreign law enforcement and intelligence community operations providing support in all phases of the digital forensics lifecycle.
  • Developed strategic partnerships with stakeholders to streamline workflow processes and improve service delivery.
  • Managed complex cases involving multiple devices and terabytes of data, delivering thorough analyses under tight deadlines.
  • Analyzed digital evidence to ensure data integrity in support law enforcement investigations and intelligence operations.
  • Wrote detailed reports outlining findings, methodologies, and recommendations from forensic examinations for clients.
  • Developed SOP, reporting templates, process checklists and other key documentations and led initiatives to improve digital forensic processes and data recovery efforts to enhance efficiency and improve analysis efforts.
  • Mentored junior analysts on best practices in digital forensic techniques and processes.
  • Investigated cyber incidents, identifying indicator of compromise, root cause and recommending remediation strategies.
  • Recovered lost or deleted data from various digital devices, enabling clients to retrieve valuable information and mitigate potential losses.
  • Assisted in designing and implementing a secure evidence storage system, preserving the integrity of digital artifacts for future analysis.
  • Evaluated new software tools for integration into the forensic analysis workflow, enhancing overall investigative capabilities.
  • Streamlined processes for evidence collection, reducing case backlog and increasing successful case resolution.
  • Provided technical support to clients during sensitive investigations, maintaining clear communication and fostering positive relationships.
  • Participated in multi-disciplinary teams for complex cases, collaborating with other experts to provide comprehensive investigative support.
  • Maintained chain-of-custody documentation for all collected evidence, ensuring admissibility in court proceedings.

Sr. Multi-Source Intel Support Specialist, Assured Information Security

NSA
07.2014 - 02.2017
  • Key member of the digital currencies team focused on identifying the manipulation of digital currencies and its affiliation to current and emerging cyber threats actors, and dark web activity by criminal organizations.
  • Performed threat assessments and analysis of cyber-crimes and ransomware activity.
  • Produced serialized intelligence reports disseminated to the Intelligence Community and federal law enforcement agencies.
  • Collaborated with numerous intelligence and law enforcement organizations providing information on observed cyber-criminal activity and their trends.
  • Briefed intelligence community senior leadership, law enforcement partners, and policy makers on current and emerging cyber-crimes activity including new hacking methods, malware distribution, vulnerability exploitation and illicit use of digital currency.
  • Managed cyber threat target bio-profiles and produced serialized intelligence reports identifying new activity, tactics and observed patterns.
  • Reviewed, edited and performed quality control assessment on drafted intelligence reports produced by junior analysts.
  • Key contributor to the creation and standardization of the digital currencies reporting guidance.

Open-Source Counter Intelligence Analyst

Booz Allen Hamilton (DIA)
07.2013 - 07.2014
  • Performed counter intelligence open-source research and analysis in support of international intelligence operations targeting adversarial state sponsored activity.
  • Analyzed data trends to support intelligence assessments and strategic decision-making.
  • Developed comprehensive reports to communicate findings to senior leadership effectively.
  • Leveraged computer network knowledge and employed various data collection and analysis techniques to develop specific organization and/or personal biographic profile reports supporting state sponsored intelligence and criminal activity investigations.
  • Provided high-quality consultation and threat assessment on a variety of dynamic, complex, and evolving cyberspace/social media trends and threats.
  • Served as the Latin America area of operation liaison, conducted various briefs, site visits and knowledge exchange with various organization leads and analysts.

Intelligence Analyst

GLS (INSCOM)
12.2011 - 12.2012
  • Intelligence and language analyst supporting DoD and law enforcement efforts targeting organized illicit financial activity.
  • Applied intelligence analysis methods and techniques to develop and enrich target knowledge and generate assessments based on collected and analyzed data.
  • Performed in-depth analysis of digital networks (DNI) data, computer network operations (CNO) to identify unique traits, signatures, and behavioral patterns.
  • Developed and enriched target bio-profiles and fused lead information with collected data to produce serialized reports in support of law enforcement efforts.
  • Developed comprehensive reports presenting actionable insights for senior intelligence community leadership.

Signals Intelligence (SIGINT) Analyst

U.S. Air Force
08.2004 - 10.2011
  • Performed analysis of collected intelligence in support of law enforcement counter narcotics operations planning and execution throughout North, Central, South America and the Caribbean.
  • Liaison to joint intelligence operations center, provided critical support, additional resources and intelligence focused on countering transnational criminal activity.
  • Performed in-depth analysis of digital networks data, computer network operations and communications protocol to identify behavioral patterns, develop flow charts produce intelligence assessments and reports.
  • Constructed, deconstructed, evaluated, and integrated communication equipment, computers, and other electronic devices in support of intelligence community operations and law enforcement investigations.
  • Responsible for end-to-end process of acquired data from targeted communications systems to produce intelligence reports, readable text, and voice cuts.

Digital Forensics Analyst (HUMINT/CI Ops)

U.S. Air Force (Deployment)
07.2008 - 03.2009
  • Leveraged several digital forensic tools to collect forensic images, process and conduct examination and analysis to support battlefield operations and anti-terrorism/criminal investigations.
  • Collaborated with targeting analysts and law enforcement teams to identify significant data and artifacts critical to daily combat operations and ongoing investigations.
  • Accredited with identifying and providing intelligence that led to the capture of 15 high valued targets.
  • Collaborated with international coalition forces command personnel, provided daily critical intelligence to maintain mission success at a high success rate.
  • Served as the liaison between Defense Intelligence Agency's (DIA) Joint Media Exploitation Center and the Joint Task Force; developed an efficient data transfer and intelligence sharing process that significantly decreased dissemination of intelligence between the joint group and operators.
  • Served as the liaison between DIA’s Joint Media Exploitation Center and the International Security Assistance Forces, performed daily intelligence briefing to both high-level US command staff and allied commanders through my assigned region of operation.

Education

BS - Homeland Security (Emergency Management/Public Safety focus)

University of Maryland University College
05.2015

BS - History (Historical Research)

University of Maryland University College
05.2015

AAS - Communications Applications Technology

Community College of the Air Force
01.2009

Skills

  • Digital forensics incident response and intelligence analysis specialist
  • Cybersecurity investigation and data recovery specialist
  • Experienced in digital forensic incident response and threat detection using advanced security solutions and industry standard digital forensic tools and techniques
  • Cyber threat, open-source and counter intelligence research experience
  • Experience with technical report, executive summary, SOP, IR Plan and CONOP documentation preparation

  • Proficient in collaboration with intelligence and law enforcement agencies
  • Effective collaboration with team members and clients
  • Strong oral and written communication skills
  • Proficient in English and Spanish, basic Portuguese comprehension

Affiliations

  • University of Maryland University College Dean’s List recipient (5 times)
  • International Honor Society in Social Sciences (Pi Gamma Mu) Member, inducted March 2014.

Certification

  • IACIS CFIR: Cyber Incident Forensic Response (2025)
  • SANS SEC504: Hacker Tools, Techniques, and Incident Handling (2024)
  • SANS SEC401: Security Essentials (2023)
  • CrowdStrike Certified Falcon Responder (CCFR)
  • Certified Forensics Computer Examiner (CFCE), IACIS, (Active since 2018)
  • Magnet AXIOM Incidence Response Examinations Course (AX310), Magnet, 2021
  • Magnet AXIOM Cyber Examinations Course (CY200), Magnet, 2021
  • Magnet AXIOM Forensics Examination Course (AX200), Magnet, 2020
  • Magnet AXIOM Advanced iOS Examinations Course (AX302), Magnet, 2020
  • Magnet AXIOM Advance Mobile Forensics Course (AX300), Magnet, 2020
  • Magnet AXIOM Forensic Fundamentals Course (AX100), Magnet, 2019 (refresher in 2021)
  • DoD Digital Forensic Examiner Certification, Defense Cyber Investigations Training Academy (DCITA), 2020
  • Basic Computer Forensic Examiner Course (BCFE), IACIS, 2018
  • Digital Media Collector Certification, Defense Cyber Crimes Center, 2018
  • Computer Incident Response Course (CIRC), Defense Cyber Crimes Center, 2018
  • Intro to Networks and Computer Hardware (INCH), Defense Cyber Investigations Training Academy, 2018
  • Detego Certified Digital Forensic Examiner, Teel Technologies, 2019
  • Blackthorn Forensic Examiner Certification, Berla, 2019
  • Cellebrite Mobile Forensic Fundamentals (CMFF), Cellebrite, 2019
  • Cellebrite Certified Operator, Cellebrite (CCO), 2020
  • Cellebrite Certified Physical Analyst (CCPA), Cellebrite, 2020
  • DHS-Homeland Security Investigation's BCERT: Basic Computer Evidence Recovery Training (2017)
  • A+ Information System Certification, CompTIA, 2017
  • Certified, Media and Document Exploitation Course, DIA Washington, 2008
  • Certified, Signals Collection Analysis Course (450), Center for Information Dominance, 2005

Languages

Language Proficiency: English & Spanish (Fluent)

Timeline

Principal Cyber Security Analyst

MSTS, DoE/NNSS
01.2023 - Current

Digital Forensic Incident Response Consultant

Optiv Security, Inc.
11.2021 - 11.2022

Sr Digital Forensic Analyst | Liaison (GS-13)

DHS HQ Intelligence & Analysis
03.2017 - 11.2021

Sr. Multi-Source Intel Support Specialist, Assured Information Security

NSA
07.2014 - 02.2017

Open-Source Counter Intelligence Analyst

Booz Allen Hamilton (DIA)
07.2013 - 07.2014

Intelligence Analyst

GLS (INSCOM)
12.2011 - 12.2012

Digital Forensics Analyst (HUMINT/CI Ops)

U.S. Air Force (Deployment)
07.2008 - 03.2009

Signals Intelligence (SIGINT) Analyst

U.S. Air Force
08.2004 - 10.2011

BS - History (Historical Research)

University of Maryland University College

AAS - Communications Applications Technology

Community College of the Air Force

BS - Homeland Security (Emergency Management/Public Safety focus)

University of Maryland University College

Awards

Secretary of Homeland Security’s Unity of Effort Award, Joint Service Commendation Medal, Joint Service Achievement Medal (2), Air Force Good Conduct Medal (2), NATO Service Medal (ISAF) (2), Afghanistan Campaign Medal, Global War on Terrorism Medal