Robert Fleetwood

Red Team Security Engineer at Millennium Corporation
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Huntsville, Alabama, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • (ISC)2 Security CISSP (ISC2-CISSP)
    (ISC)²
    Feb, 2022
    - Nov, 2024
  • Private Aircraft Pilot
    Federal Aviation Administration
    Oct, 2021
    - Nov, 2024
  • Red Team Apprentice Certified (RTAC)
    kfivefour
    Jan, 2021
    - Nov, 2024
  • Certified Ethical Hacker (CEH)
    EC-Council
    Jul, 2021
    - Nov, 2024
  • CompTIA Security+
    CompTIA
    Mar, 2019
    - Nov, 2024

Experience

    • United States
    • Information Technology & Services
    • 200 - 300 Employee
    • Red Team Security Engineer
      • Jan 2020 - Present

      · Provide operational effects through adversarial replication to strengthen security for the state of Kansas, the Air Force and the Department of Defense (DoD). · Tier 1 threat replication and cyber security testing as DoD’s premier Cyber Aggressor Force. Social Engineering, Phishing, Web Exploitation, Physical Aggression. · Provide operational effects through adversarial replication to strengthen security for the state of Kansas, the Air Force and the Department of Defense (DoD). · Tier 1 threat replication and cyber security testing as DoD’s premier Cyber Aggressor Force. Social Engineering, Phishing, Web Exploitation, Physical Aggression.

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Cyber Warfare Operator
      • Aug 2017 - Present

      · Blue Team Operations. Utilizing Elasticsearch, Logstash, Kibana, Moloch, Wireshark, Nessus, SANs Forensic Investigation Toolkit, Zeek, Suricata, Snort. · Conduct surveys of Mission Networks and Vulnerability scanning to match STIGs. · Reverse Malware engineering and Threat Hunting of foreign influences on partner’s unclassified and secret networks. · Develops, plans, and integrates base communications and intelligence systems. Controls, manages, and monitors project milestones and… Show more · Blue Team Operations. Utilizing Elasticsearch, Logstash, Kibana, Moloch, Wireshark, Nessus, SANs Forensic Investigation Toolkit, Zeek, Suricata, Snort. · Conduct surveys of Mission Networks and Vulnerability scanning to match STIGs. · Reverse Malware engineering and Threat Hunting of foreign influences on partner’s unclassified and secret networks. · Develops, plans, and integrates base communications and intelligence systems. Controls, manages, and monitors project milestones and funding from inception to completion. · NCO of BLDG 44 Construction. Lead, supervised and directed a team of Airman in the construction of the 184th IW’s newest SCIF renovation. Including cabling, maintaining server farm, and directing watch rotations to fit the needs of the wing. · Manages, supervises, and performs planning and implementation of unit policies, project installation, system configuration, and integration conformity. · Applies communications security programs to include physical, cryptographic, transmission, and emission security. Develops and ensures compliance with safety standards and instructions. · Penetration testing of Windows and *nix based distributions. · Trained to gain access, elevate privileges, establish persistence and collect on rival networks. · Identify Cybersecurity - TCP/IP Protocol vulnerabilities with Metasploit Framework. · Develops and Maintains network architecture via Cisco Switching and Routing devices. · Developing and implementing Network Traffic Plans and Analysis. · Utilizes resources for audit and inspection of packets, logs, and Netflow captures in support of tasked unit missions / cyberspace operations. · Develop tactical plans and recommendations for Cyber Protection Team and its subordinate squads involving Defensive Cyber Operations (Computer Network Defense). · Establishes baselines for Network testing and comparison to mitigate vulnerabilities and further develop tactics and procedures. Show less · Blue Team Operations. Utilizing Elasticsearch, Logstash, Kibana, Moloch, Wireshark, Nessus, SANs Forensic Investigation Toolkit, Zeek, Suricata, Snort. · Conduct surveys of Mission Networks and Vulnerability scanning to match STIGs. · Reverse Malware engineering and Threat Hunting of foreign influences on partner’s unclassified and secret networks. · Develops, plans, and integrates base communications and intelligence systems. Controls, manages, and monitors project milestones and… Show more · Blue Team Operations. Utilizing Elasticsearch, Logstash, Kibana, Moloch, Wireshark, Nessus, SANs Forensic Investigation Toolkit, Zeek, Suricata, Snort. · Conduct surveys of Mission Networks and Vulnerability scanning to match STIGs. · Reverse Malware engineering and Threat Hunting of foreign influences on partner’s unclassified and secret networks. · Develops, plans, and integrates base communications and intelligence systems. Controls, manages, and monitors project milestones and funding from inception to completion. · NCO of BLDG 44 Construction. Lead, supervised and directed a team of Airman in the construction of the 184th IW’s newest SCIF renovation. Including cabling, maintaining server farm, and directing watch rotations to fit the needs of the wing. · Manages, supervises, and performs planning and implementation of unit policies, project installation, system configuration, and integration conformity. · Applies communications security programs to include physical, cryptographic, transmission, and emission security. Develops and ensures compliance with safety standards and instructions. · Penetration testing of Windows and *nix based distributions. · Trained to gain access, elevate privileges, establish persistence and collect on rival networks. · Identify Cybersecurity - TCP/IP Protocol vulnerabilities with Metasploit Framework. · Develops and Maintains network architecture via Cisco Switching and Routing devices. · Developing and implementing Network Traffic Plans and Analysis. · Utilizes resources for audit and inspection of packets, logs, and Netflow captures in support of tasked unit missions / cyberspace operations. · Develop tactical plans and recommendations for Cyber Protection Team and its subordinate squads involving Defensive Cyber Operations (Computer Network Defense). · Establishes baselines for Network testing and comparison to mitigate vulnerabilities and further develop tactics and procedures. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Intelligence Analyst
      • Jun 2013 - Aug 2017

      Conducts Joint cryptologic operations at the National Security Agency / Central Security Service (NSA/CSS) Texas. Conducts Information Warfare Support and direct Warfare Support. -Joint Special Operations Command (JSOC) Signals Intelligence (SIGINT) course | APR 2016 | Fort Bragg, NC ·Related coursework: SIGINT GSM, Push to Talk, VHF, NSA suite, SOIS, JIANT, Analyst Notebook, Google Earth -Command, Control, Computing, Communications, Intelligence (C4I) CONCEPTS | JUN 2009 | CSCS… Show more Conducts Joint cryptologic operations at the National Security Agency / Central Security Service (NSA/CSS) Texas. Conducts Information Warfare Support and direct Warfare Support. -Joint Special Operations Command (JSOC) Signals Intelligence (SIGINT) course | APR 2016 | Fort Bragg, NC ·Related coursework: SIGINT GSM, Push to Talk, VHF, NSA suite, SOIS, JIANT, Analyst Notebook, Google Earth -Command, Control, Computing, Communications, Intelligence (C4I) CONCEPTS | JUN 2009 | CSCS Pearl Harbor -Non-Compliant Visit, Board, Search and Seizure (NC-VBSS) - Intelligence Collection | NOV 2008 | CENSECFOR Pearl harbor -Electronic Intelligence Electronic Warfare (ELINT EW) journeyman | OCT 2008 | CID San diego -Electronic Warfare Threat Recognition | JUN 2008 -SIGINT Cryptological Analysis | NOV 2007 | CID Pearl harbor -Shipboard Intelligence | JAN 2007 | TTC Corry Station, FL -Electronic Intelligence | NOV 2006 | TTC Corry station, FL ·Related coursework: ELINT, SLQ-32, GALElite, Wrangler, STRED, FalconVIEW, Threat Rec, Weapons Systems, Spectrum Management 2.7-17 GHz Show less Conducts Joint cryptologic operations at the National Security Agency / Central Security Service (NSA/CSS) Texas. Conducts Information Warfare Support and direct Warfare Support. -Joint Special Operations Command (JSOC) Signals Intelligence (SIGINT) course | APR 2016 | Fort Bragg, NC ·Related coursework: SIGINT GSM, Push to Talk, VHF, NSA suite, SOIS, JIANT, Analyst Notebook, Google Earth -Command, Control, Computing, Communications, Intelligence (C4I) CONCEPTS | JUN 2009 | CSCS… Show more Conducts Joint cryptologic operations at the National Security Agency / Central Security Service (NSA/CSS) Texas. Conducts Information Warfare Support and direct Warfare Support. -Joint Special Operations Command (JSOC) Signals Intelligence (SIGINT) course | APR 2016 | Fort Bragg, NC ·Related coursework: SIGINT GSM, Push to Talk, VHF, NSA suite, SOIS, JIANT, Analyst Notebook, Google Earth -Command, Control, Computing, Communications, Intelligence (C4I) CONCEPTS | JUN 2009 | CSCS Pearl Harbor -Non-Compliant Visit, Board, Search and Seizure (NC-VBSS) - Intelligence Collection | NOV 2008 | CENSECFOR Pearl harbor -Electronic Intelligence Electronic Warfare (ELINT EW) journeyman | OCT 2008 | CID San diego -Electronic Warfare Threat Recognition | JUN 2008 -SIGINT Cryptological Analysis | NOV 2007 | CID Pearl harbor -Shipboard Intelligence | JAN 2007 | TTC Corry Station, FL -Electronic Intelligence | NOV 2006 | TTC Corry station, FL ·Related coursework: ELINT, SLQ-32, GALElite, Wrangler, STRED, FalconVIEW, Threat Rec, Weapons Systems, Spectrum Management 2.7-17 GHz Show less

  • Special Operations JTF
    • Middle East / Southwest Asia
    • Signals Intelligence Analyst
      • Feb 2016 - Nov 2016

      NCOIC REGIONAL TARGETING CELL | SPECIAL OPERATIONS JTF – BAGRAM AFGHANISTAN | FEB 2016 – NOV 2016 · All-Source Production. Provides Cryptological tactical support and target exploitation. · Created over 1,900 intelligence products for multiple agency customers during real world operations against high profile threat networks. · Fused SIGINT with HUMINT and ELINT to create strategic and tactical picture of Afghanistan AOR. · Conducted more than 120 operations resulting in… Show more NCOIC REGIONAL TARGETING CELL | SPECIAL OPERATIONS JTF – BAGRAM AFGHANISTAN | FEB 2016 – NOV 2016 · All-Source Production. Provides Cryptological tactical support and target exploitation. · Created over 1,900 intelligence products for multiple agency customers during real world operations against high profile threat networks. · Fused SIGINT with HUMINT and ELINT to create strategic and tactical picture of Afghanistan AOR. · Conducted more than 120 operations resulting in the removal of more than 145 enemy combatants and commanders. · Managed crew of 3 military and 16 civilians. Use of ARCGIS, mIRC, Google Maps, Wrangler, GALE-lite, several NSA tools. ·Used technical expertise to conduct Investigations for Theater Counter Intelligence. ·Created and screened NSA SIGINT Reporting, directly advising local Commanders in high stress environment. Show less NCOIC REGIONAL TARGETING CELL | SPECIAL OPERATIONS JTF – BAGRAM AFGHANISTAN | FEB 2016 – NOV 2016 · All-Source Production. Provides Cryptological tactical support and target exploitation. · Created over 1,900 intelligence products for multiple agency customers during real world operations against high profile threat networks. · Fused SIGINT with HUMINT and ELINT to create strategic and tactical picture of Afghanistan AOR. · Conducted more than 120 operations resulting in… Show more NCOIC REGIONAL TARGETING CELL | SPECIAL OPERATIONS JTF – BAGRAM AFGHANISTAN | FEB 2016 – NOV 2016 · All-Source Production. Provides Cryptological tactical support and target exploitation. · Created over 1,900 intelligence products for multiple agency customers during real world operations against high profile threat networks. · Fused SIGINT with HUMINT and ELINT to create strategic and tactical picture of Afghanistan AOR. · Conducted more than 120 operations resulting in the removal of more than 145 enemy combatants and commanders. · Managed crew of 3 military and 16 civilians. Use of ARCGIS, mIRC, Google Maps, Wrangler, GALE-lite, several NSA tools. ·Used technical expertise to conduct Investigations for Theater Counter Intelligence. ·Created and screened NSA SIGINT Reporting, directly advising local Commanders in high stress environment. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Information Operations Instructor
      • Dec 2010 - Jun 2011

      Temporary shore duty as an Instructor for Carrier Strike Group IO. Military Deception, Anti-Ship Missile Defense, Cryptology, Command Control, Spectrum Domination, Signals Intelligence, etc.

    • EW Mission Planner (E-5 Petty officer 2nd class) | USF-I Joint Fires Baghdad Iraq
      • Mar 2010 - Dec 2010

      Forward Deployed Iraq Operation Iraqi Freedom ·Executed over 2000 Joint EW missions and 1900 hours of Electronic Protection to ground forces. ·COMMS EA / EP lead to 30% decrease in IED detonations across Iraq. · Zero Casualties. · Lead and mentored group of 30+ young Iraqi children as Kashafa Leader in partnership with Iraqi Special Operations Forces. ·Weekly Briefings with Iraqi General and local Sheik.

    • Electronic Warfare Technician
      • Jun 2006 - Mar 2010

      ·Lead, trained and managed 10 sailors in watch standing and electronic warfare ops in Eastern Pacific AOR to include ELINT operations against rival nation naval forces and Operation Stellar Reaper satellite destruction. ·EW Ops included shipboard raw ELINT / SIGINT technical collection and use of satellite systems. ·Versed in various nation’s emitters and associated weapons systems and capabilities. ·Employed passive and active countermeasure for anti-ship missile defense. · Use… Show more ·Lead, trained and managed 10 sailors in watch standing and electronic warfare ops in Eastern Pacific AOR to include ELINT operations against rival nation naval forces and Operation Stellar Reaper satellite destruction. ·EW Ops included shipboard raw ELINT / SIGINT technical collection and use of satellite systems. ·Versed in various nation’s emitters and associated weapons systems and capabilities. ·Employed passive and active countermeasure for anti-ship missile defense. · Use of Wrangler, STRED, FalconView and Gale-lite. Trained 150+ sailors in anti-terrorism and security force tactics. ·Trainer for the Non-Compliant Vessel Boarding Search and Seizure team, conducting tactical collection of all source intelligence at sea during Counter-Piracy Operations. ·Created and proofed Intelligence reports and advised changes in reporting policy to Type Commanders in support of Joint Operations in the Far East. ·Advised local Commanders on changing their methods of Intelligence collection and evaluation when in a time sensitive combat environment to greatly enhance the capabilities of countermeasures and Anti-Ship Missile Defense (ASMD) procedure, increasing combat effectiveness and survivability.

Education

  • Wichita State University
    Bachelor of Business Administration (BBA), Finance and Financial Management Services
    2012 - 2017

Community

You need to have a working account to view this content. Click here to join now