Profiles search
Will Morgan
InfoSec Specialist | Architecture Engineer | Distributed Systems Engineer | Software Developer
Washington D.C., DC, United States
Details
Experience:
2023 : Present
Nasdaq
Information Security Senior Specialist
Leverage Azure Databricks and Pyspark to gather, transform, and feed data into custom Kibana security dashboards.
Build autonomous cyber lab to test products and integrations to improve functionality and safe deployment.
Partner with vendors to deploy U.S. Army Tactical Network’s Elastic and Endgame, and CyberVAN technologies.
Engage with sponsor on data and reporting requirements for endpoint security management using Azure.
Evolve and advance available project environment capabilities to support reverse engineering efforts.
Manage isolated network inside company using Juniper switches and routers with no downtime.
2022 : 2023
MITRE
Lead Cyber Architecture and Resiliency Engineer
Evaluated and briefed DISA on Azure and AWS native CWPP capabilities to inform on what they own and gaps.
Designed and built site-redundant VMware clusters, using iXsystems SANs, Juniper EX switches, Dell/HPE servers.
Briefed DISA on the purpose of Kubernetes, how it works, and why it will change app deployments and endpoints.
Engaged with vendors at Microsoft, AWS, (Elastic) Endgame, Forcepoint, Juniper, VMware, Peraton, and Zscaler.
Pioneered AWS playground and Azure IaaS test environment to improve capabilities of NERVE enclaves.
Assessed Forcepoint against MITRE InfoSec Zero Trust test cases, requirements, and reporting results.
Updated DISA on Endpoint Security Stack manageability comparing HBSS and Windows Defender.
Integrated Python apps with SQL APIs and queries to access and retrieve database information.
2019 : 2022
MITRE
Senior Cyber Security Engineer
Developed post-compromise adversary detection prototype in Python3 with stealth and deception techniques.
Coded automation for virtualization infrastructure deployment : PXE booting, Syslinux, Powershell, and PowerCLI.
Used ATT&CK to develop post exploit analytics that effectively tracked adversary activity post-compromise.
Represented MITRE in sponsor labs and architected Tactical Network 5GTI deployments and EDR evaluations.
Deployed VMware cluster for MITRE Aberdeen, configuring servers, NetApp SAN, and Cisco Nexus switches.
Implemented Proxmox clusters for new InfoSec approved labs for malware analysis and prototyping apps.
Supported sensitivity needs by building nested network with SRX devices, cert-based IPSec VPNs, and ADVPN.
2018 : 2019
MITRE
Cyber Security Engineer
Contributed to defensive cyber analytics to consider post exploit analytics for tracking adversary activity.
Used Python to begin build of “friendly malware” prototype with stealth and deception built into the design.
Built VMware ESXi and Proxmox virtualization appliances for new project lab developments.
2016 : 2017
MITRE
Cyber Security Intern
Nasdaq
Information Security Senior Specialist
Leverage Azure Databricks and Pyspark to gather, transform, and feed data into custom Kibana security dashboards.
Build autonomous cyber lab to test products and integrations to improve functionality and safe deployment.
Partner with vendors to deploy U.S. Army Tactical Network’s Elastic and Endgame, and CyberVAN technologies.
Engage with sponsor on data and reporting requirements for endpoint security management using Azure.
Evolve and advance available project environment capabilities to support reverse engineering efforts.
Manage isolated network inside company using Juniper switches and routers with no downtime.
2022 : 2023
MITRE
Lead Cyber Architecture and Resiliency Engineer
Evaluated and briefed DISA on Azure and AWS native CWPP capabilities to inform on what they own and gaps.
Designed and built site-redundant VMware clusters, using iXsystems SANs, Juniper EX switches, Dell/HPE servers.
Briefed DISA on the purpose of Kubernetes, how it works, and why it will change app deployments and endpoints.
Engaged with vendors at Microsoft, AWS, (Elastic) Endgame, Forcepoint, Juniper, VMware, Peraton, and Zscaler.
Pioneered AWS playground and Azure IaaS test environment to improve capabilities of NERVE enclaves.
Assessed Forcepoint against MITRE InfoSec Zero Trust test cases, requirements, and reporting results.
Updated DISA on Endpoint Security Stack manageability comparing HBSS and Windows Defender.
Integrated Python apps with SQL APIs and queries to access and retrieve database information.
2019 : 2022
MITRE
Senior Cyber Security Engineer
Developed post-compromise adversary detection prototype in Python3 with stealth and deception techniques.
Coded automation for virtualization infrastructure deployment : PXE booting, Syslinux, Powershell, and PowerCLI.
Used ATT&CK to develop post exploit analytics that effectively tracked adversary activity post-compromise.
Represented MITRE in sponsor labs and architected Tactical Network 5GTI deployments and EDR evaluations.
Deployed VMware cluster for MITRE Aberdeen, configuring servers, NetApp SAN, and Cisco Nexus switches.
Implemented Proxmox clusters for new InfoSec approved labs for malware analysis and prototyping apps.
Supported sensitivity needs by building nested network with SRX devices, cert-based IPSec VPNs, and ADVPN.
2018 : 2019
MITRE
Cyber Security Engineer
Contributed to defensive cyber analytics to consider post exploit analytics for tracking adversary activity.
Used Python to begin build of “friendly malware” prototype with stealth and deception built into the design.
Built VMware ESXi and Proxmox virtualization appliances for new project lab developments.
2016 : 2017
MITRE
Cyber Security Intern
Company:
Nasdaq
About
Distributed Systems Engineer and Software Developer with parallel processing, cloud services and virtualization, and cyber security expertise, who develops secure and performant from the ground up. Five years evaluating and advising on cloud service providers, developing parallel computing, designing and building infrastructure, and coordinating design and architecture with vendors on behalf of MITRE and the Department of Defense.