Ryan V.
Details
2023 : Present
Undisclosed
IR Lead / Cybersecurity Analyst / Purple Team Advocate
https : //www.disa.mil/en/NewsandEvents/2022/DISA-and-Army-Reserves-reset-teaming-efforts
Currently serving as a 25D Cyber Network Defender since 2018.
The job description for the 25D MOS is :
Performs the duties associated with the five Computer Network Defense (CND) specialties (i.e., Infrastructure Support (IS), Analyst (AN), Incident Responder (IR), Auditor (AU) and Manager (MGR)), Information Assurance Technical (IAT) Levels I-III functions, Information Assurance Management (IAM) Levels II-III functions, as required by skill level IAW AR 25-2 and DoD 8570.01-M, and Communications Security (COMSEC) Account Management (CAM) IAW AR 380-40. CND protects against, monitors for, performs analysis of, responds to and detects unauthorized activity in the cyberspace domain, which includes deployment and administration of the CND infrastructure; performs deliberate actions to modify information systems or network configurations in response to CND alert or threat information; collects data gathered from a variety of CND tools to analyze events and warn of attacks that occur within the environment; plans response activities to contain and eradicate cyber incidents within the network environment or enclave; responds by validating incidents, performs incident correlation and trending, conducts network damage assessments, and develops response actions; performs assessments of threats and vulnerabilities within the network environment or enclave and identifies deviations from acceptable configurations, enclave policy, or local policy.
2018 :
United States Army Reserve
CND Analyst
Applied knowledge and Adversarial/Offensive Mindset to detect and respond to security-related activities
Reviewed security alerts/events, and performs triage analysis to identify and remediate security incidents and concerns
Performed OSINT and Threat Intelligence research to enrich and evaluate security concerns
Monitored and remediated endpoint alerts/ events using EDR solutions and tools such as Shodan, Censys, and OSINT Framework
Worked with technologies such as SNOW, Umbrella, Inky, Stellar, Tenable.SC, and AttackIQ
Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries. The company has extensive experience supporting the alternative investment space, specializing in hedge funds, private equity firms, and asset managers. Agio offers technology hosting, monitoring, management, helpdesk, disaster prevention, and recovery, as well as managed security, 360° cybersecurity programs, virtual CISO (vCISO) support, and cybersecurity consulting.
2020 : 2023
Agio
XDR - Cyber Security Analyst
Supported the ARC-P and milCloud®2.0 Cyber Security Team.
https : //www.milcloud2.com/
Reviewed alerts & events for security incidents
Supported a FedRAMP High accredited Commercial Cloud Solution
Performed triage analysis to identify and remediation of security concerns
Assisted SOC leadership with SOC Alert Handling Guide/ SOP
Assisted Network Admins in creating VPN accounts for the controlled environment
Trains and mentored Interns and Jr SOC analyst
2019 : 2020
General Dynamics Information Technology
Cyber Security Analyst, Sr. | SOC Analyst | IR Team Member
TSE - Responsible for providing technology support to the field, customers, and partners via automated dial-homes; voice initiated calls as well as chat and web support calls. Apply general to intermediate level technical support skills and knowledge to resolve customer issues in Storage/NAS technologies. Makes independent decisions to determine service level severity and assess when and how to escalate to other resources within the organization. Works with cross functional teams in resolving customer issues; identifies and provides resolutions to a diverse range of technical problems. Identifies and documents procedures and knowledge base articles to proactively improve customer satisfaction. Develops and participates in solutions training and problem resolution skills development.
2015 : 2019
Dell EMC
Technical Support Engineer
About
I've been trained in Psychological Operations, Signals Intelligence Analysis and Cyber Network Defense. In my talk at the Raleigh ISSA InfoSeCon, Oct. 2022, “Computers Minds and RadioFreaks” I presented the intersectionality of the three above fields and how it can affect CEOs, Businesses, and individuals.
TryHackMe 2%
Certifications:
EC-Council Certified Ethical Hacker (CEH) Systems Security Certified Practitioner (SSCP)
GIAC Penetration Tester (GPEN) GIAC Certified Incident Handler (GCIH)
GIAC Security Leadership (GSLC) GIAC Systems and Network Auditor (GSNA)
GIAC Continuous Monitoring Certification (GMON) GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Enterprise Defender (GCED) GIAC Security Essentials (GSEC)
CompTIA Security Analytics Professional (CSAP) CompTIA Secure Infrastructure Specialist (CSIS)
ITILv4 CIW: Site Development Associate, Web Security Professional
Education:
WGU - B.S. SCIA
**** The views expressed on this website are mine alone and do not necessarily reflect the views of my employer(s). ****
Has a Growth mindset (Carol Dweck) with a commitment to continuous learning in the area of cyber threats, common attack vectors, exploits, and adversary tactics, techniques, and procedures (TTPs)
Cybersecurity professional with a strong interest in ethical hacking, penetration testing, Social Engineering, and Physical Security testing.
I am looking for a role as a Cyber-warfare specialist where I can apply my unique perspective in the Information Operation Environment.
Currently in a cybersecurity role where I continue to develop and gain additional Knowledge, Skills, and Abilities (K+S=As) while contributing to the overall success of the organization and my clients.
* Daily use of an Adversarial and Analytical mindset
* Developing / recommending analytic approaches to challenges for which information is incomplete or for which no precedent exists.
* Recognizing / mitigating cognitive biases which may affect analysis.
See - https://www.cia.gov/static/9a5f1162fd0932c29bfed1c030edf4ae/Pyschology-of-Intelligence-Analysis.pdf
Ability to analyze informational products covering friendly and adversary operations, capabilities, objectives, vulnerabilities, and gaps.
Expertise to identify, evaluate, and recommend tools, applications, processes, and integrated solutions to achieve client objectives.
Max character limit here is 2600, coincident? I THINK NOT!
Scan, Enumerate, Exploit, Pivot, Ex-filtrate
Platforms: HackTheBox, TryHackMe, HackerOne, TCM-Academy, Portswigger Academy