Nathan M.
Details
Cyber Operations with an emphasis in Cyber Engineering
University of Arizona
2020 : 2023
Undergraduate Certificate
Cyber Operations
University of Arizona
2020 : 2023
SANS VetSuccess Academy 2022
SANS Technology Institute
2022 : 2022
Associate of Science - AS
Intelligence Operation Studies
Cochise College
2017 : 2018
Criminal Justice/Police Science
Oakland Community College
2004 : 2007
drive successful customer focused outcomes while balancing the need for enhanced levels of
security associated with both classified and unclassified systems.
Perform in-depth and targeted research of nation-state level threats to customer systems and
networks, focusing primarily on relevant and realistic threats posed to in place technology with a
direct impact on operational capabilities.
Engaged in collaborative work across multiple functional teams, taking the lead on complex projects
that require extensive communication and a deep technical knowledge supporting the broad
strategic goals of not only the Naval Surface Warfare Center, but that of the greater Department of
Defense.
2023 : Present
Naval Surface Warfare Center Dahlgren Division
Cybersecurity Engineer
Attending the University of Arizona’s Cyber Operations Program while under DoD CySP. The DoD CySP is a Department of Defense Cybersecurity Scholarship.
2022 : 2023
Naval Surface Warfare Center Dahlgren Division
DoD CySP Scholar
2022 : 2022
Naval Surface Warfare Center Dahlgren Division
Cybersecurity Engineer
Reported directly to the Crime Intelligence Unit while working within a dedicated team of analysts at the City of Detroit’s 24/7/365 Real Time Crime Center. Monitored an extensive network of well over a 1,000 live video feeds, respond to immediate ShotSpotter alerts, and provided critical real-time updates across Police Department’s radio communication system, providing direct support to active police operations and ongoing investigations.
Applied Open-Source Intelligence collection and analysis techniques while monitoring social media networks for active threats and potential criminal activity, while prioritizing proactive prevention through diligent research and collaboration. Utilized Excel, Tableau, and ArcGIS Online, to produce ad hoc, daily, weekly, and monthly reports to identify crime hot-spots, monitor trends/patterns, while categorizing and emphasizing especially violent and high-risk incidents.
2021 : 2022
City of Detroit
Crime Analyst
Informed stakeholders on over 300 occasions; while using intelligence derived from multiple sources to include; OSINT, GEOINT, SIGINT, HUMINT, MASINT, and other forms of threat intelligence. As an analyst team lead I encouraged the development of cross-cultural skills and promoted collaboration, establishing effective partnerships and ensuring mission alignment.
During that time our analytical team worked closely together to foster and maintain key relationships with over 20 of our Korean counterparts. Additionally, we utilized network platforms during daily operations to perform ad hoc reporting and short term analysis for special projects as requested such as geographical region analysis, military capabilities, personnel assessments, and historical reviews to inform strategic decision making and support senior leadership.
Achievements
- Recognized by the Republic of Korea (South Korea) Army Assistant Chief of Staff for outstanding performance as an All Source Intelligence Analyst in 2019.
- Graduated from the US Army’s 16 week All Source Intelligence Analyst course.
2017 : 2020
US Army
Threat Intelligence Analyst
Skills
Adobe Acrobat, Amazon Web Services (AWS), Analytical Skills, Assembly Language, Bash, C (Programming Language), Communication, Critical Thinking, customer service, Cybersecurity, Cyber Security, Cyber Threat Intelligence (CTI), Digital Forensics, Incident Response, Information Security, Information Technology, Intelligence Analysis, International Relations, IT Operations, Leadership, Linux, Malware Analysis, Microsoft Azure, Microsoft Excel, Microsoft PowerPoint, Military Operations, MITRE ATT&CK, Network Security, Network Services, Open Source Intelligence (OSINT), Organizational Leadership, Penetration Testing, Problem Solving, Public Speaking, Python (Programming Language), Relationship Building, Reporting & Analysis, Report Writing, Research, Risk Management Framework (RMF), Security Information and Event Management (SIEM), teaching, Teamwork, Threat Analysis, Verbal Communication, Vulnerability Assessment, Vulnerability Management, Web Application Penetration Testing, Written Communication, nasm cpt, cpr/aed/first aid qualified, fitness training, personal training, exercise physiology, san diego mesa college fitness specialist certificate, cpr certified, sports nutrition, CPR/AED/FIRST AID, San Diego Mesa College, weight training, strength training, functional training, microsoft office
About
I’m a recent graduate from the University of Arizona Cyber Operations program and DoD Cyber Scholarship Program scholar. I currently work as a Cybersecurity Engineer with the Naval Surface Warfare Center in Dahlgren, Virginia.
As a former military threat intelligence analyst with experience in the Korean Theater of Operations I’ve a strong interest in intelligence analysis and threat based reporting.
** Relevant Certifications **
GIAC Web Application Penetration Tester (GWAPT)
GIAC Certified Incident Handler (GCIH)
GIAC Security Essentials (GSEC)
ATT&CK Cyber Threat Intelligence (CTI) Certification
CompTIA Security +
CompTIA Network +
CompTIA A +
Google IT Support Professional Certificate
Microsoft Certified: Azure Fundamentals
AWS Certified Cloud Practitioner
** Awards and Achievements **
> SANS VetSuccess Academy Scholarship recipient (2022)
> DoD Cybersecurity Program Scholar (2022)
> GIAC Advisory Board (2022)
> Letter of Appreciation for outstanding performance as a Fusion Intelligence Analyst (2019)
** CTFs, Challenges, & Conferences **
> CYBERWARCON (Nov ‘23)
> BSides NOVA (Sep ‘23)
> DEFCON 30 (Aug ‘22)
> SANS SEC542 CTF (July ‘22)
> SANS SEC504 CTF (May ‘22)
> NSA Codebreaker Challenge (Aug - Dec ‘21)
> CrowdStrike Cyber Challenge (Oct ‘21)
> US Cyber Games CTF (June ‘21)
> SANS BootUp CTF (Apr ‘21)
> SANS Cyber Intelligence Summit (Jan ‘21)
** Programming Languages & Scripting **
> Python
> C
> Assembly
> Bash
** Take a look at my GitHub:
https://github.com/NTGx86
** Tools, Technology & Software **
> Linux ( RHEL, CentOS, & Ubuntu )
> macOS
> VMware Fusion
> Wireshark
> Metasploit
> sqlmap
> Burp Suite
> ZAP
> Nmap
> netcat
> John the Ripper
> Hashcat
> Autopsy
> Volatility
> VirusTotal
> Visual Studio Code
> WingIDE
> Dependency Walker
> IDA Pro
> PEiD
> PEview
> Process Monitor
> Process Explorer
> Strings
> FakeNet-NG
** Additional Areas of Expertise **
> OSI 7 Layer Model & TCP/IP Model
> Open Source Intelligence ( OSINT )
> MITRE ATT&CK Framework
> Cyber Threat Intelligence
> Briefing, Presenting & Public Speaking
> Research & Report Writing
> Risk Management Framework (RMF)
> All-Source Intelligence
> Malware Analysis (Static & Dynamic)
> Defense-in-Depth
> Physical Security
> Network Traffic Analysis
> Command Injection
> Web Application Penetration Testing
> OWASP Top 10
> SQL Injection
> Digital Forensics
> Memory Analysis
> Documentation
Last Updated: Sep 2023