Taylor N.

Cyber Crime Investigator at Sphinx
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Spotsylvania, Virginia, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • C)DFE: Certified Digital Forensics Examiner
    Mile2
    Jul, 2023
    - Nov, 2024
  • MTA: Introduction to Python Programming
    Microsoft
    May, 2018
    - Nov, 2024
  • Digital Forensics Examiner
    Defense Cyber Investigations Training Academy
    Aug, 2016
    - Nov, 2024
  • Digital Media Collector
    Defense Cyber Investigations Training Academy
    Jul, 2016
    - Nov, 2024
  • Cyber Crimes Investigator
    Defense Cyber Investigations Training Academy
    Nov, 2018
    - Nov, 2024

Experience

    • United States
    • Defense & Space
    • 1 - 100 Employee
    • Cyber Crime Investigator
      • Jan 2023 - Present

      o Directly supports Counterintelligence and Counter-Terrorism investigations by conducting digital forensic examinations of digital media, evidence acquisition/seizure, analysis, and reporting of findings. o Provides additional support for incident response activities, intrusion events, and malware analysis. o Advises and assists the client with emerging forensic technologies, operational security assessments, design/deploy the latest forensic methodologies, and in strategizing solutions for the establishment of a forensic lab. o Personally recognized by the client on multiple occasions for quality work on investigations and communications with the lead investigative element and for the development of tools to automate simple tasks. Show less

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Cyber Threat Intelligence
      • Jul 2022 - Jan 2023

      o Pivotal in identifying potential and real threats to computing infrastructure and data to provide risk mitigation strategies and recommendations. o Collaborated with the Security Operations Center, and its subsequent sections, to facilitate a more direct approach to maximize detection and protection capabilities. o Played a significant role in the development of a Cyber Threat Matrix based on the MITRE threat matrix and trending tactics, techniques, and procedures of sophisticated Advanced Persistent Threats and Cybercriminal actors to further protect the U.S. Census Bureau network environment. Show less

    • United States
    • Defense and Space Manufacturing
    • 1 - 100 Employee
    • Senior Analyst | Instructor
      • Sep 2020 - Jun 2022

      o Provided cutting edge instruction, facilitated group learning activities, and test administration for adult learners who pursued a career in the Counterintelligence field for multiple Department of Defense Agencies. o Worked closely with small and large groups of students with differing levels of experience to provide clear and informative instruction and guidance in a simulated learning scenario. o Hand-picked by the client to lead the development of Cyber-related training into the lesson plans. o Recognized on multiple occasions by the client and students for exceptional public speaking ability, using a learner-centric style of teaching, and contagious passions for the field of Counterintelligence. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Senior Instructor/Course Writer
      • Jun 2018 - Sep 2020

      Responsible for the development, instruction, and assessment of US Army CI doctrine. Worked with small and large groups of students providing clear and informative instruction and guidance in a simulated field scenario.• Collaborates with other faculty members and agents in the field to review and develop instructional strategies to address student learning objectives to provide higher quality and more relevant instruction.• Provides clear, informative lectures on Counterintelligence Investigations, Source Operations, Defense Source Operations, Analysis, and Cyber methodologies to cohorts averaging 74 students.• Developed, implemented, and monitored the first Field Training Exercise in a number of years designed to be a capstone event to assess student capabilities as a CI Special Agent in a simulated environment; recognized by senior leadership for the successful implementation and effective management of risk. Show less

    • Counterintelligence Special Agent
      • Sep 2015 - Jun 2018

      Responsible for the conduct of national security crimes investigations, liaison, operations and operations support, and security awareness presentations in order to detect, identify, assess, counter, exploit and/or neutralize adversarial state and non-state actors.• Selected over peers to lead and manage two high priority national security crimes investigations, in addition to assisting on six other cases, based on skills in interviewing, questioning techniques, and management of sensitive case information.• Developed, implemented, and managed the Covering Agent Program designed to increase liaison relationships with US Army and other government agencies in the Pacific Northwest resulting in an increase in interagency cooperation and information sharing.• Established the detachment’s cyber capability by introducing digital evidence collections, triage, storage, and proper shipment policies to expedite evidence processing times.• Conducted thorough investigative analysis on case files to identify any potential information gaps or determine the next lead to ensure investigations maintained momentum.• Presented over 150 security awareness presentations to over 20,000 Soldiers and civilians increasing the Counterintelligence reporting received by nearly 200%. Show less

    • Counterintelligence Coordinating Authority Operations Noncommissioned Officer
      • Sep 2012 - Sep 2015

      Provided Oversight, Operational Support, and Analysis to subordinate Counterintelligence entities in order to accomplish the 10th Mountain Division’s mission both in the US and deployed.• Created and shared a Cyber Counterintelligence Threat Read Book designed to increase the awareness of the cyber threat to both personal and Department of Defense network infrastructures and to increase precautions personnel take when engaging in online activities.• Produced and disseminated analytical Counterintelligence Source Reviews to determine any potential adversarial state actor manipulation for Counterintelligence and HUMINT teams placed throughout Regional Command – East, Afghanistan.• Developed, Managed, and Actively Participated in a Limited CI Red Team Operation where my team and I were directly responsible for the implementation of effective, yet inexpensive, solutions to reduce both the physical and operational security risks at multiple locations in Afghanistan.• Increased effective, actionable source reporting by 120% through source degradation analysis and corroboration with other analysts to determine source veracity and value.• Organized and facilitated a Division-wide training event for all Counterintelligence and HUMINT personnel to further expand and enhance their capabilities for upcoming deployments. Show less

    • Supply Sergeant
      • Jun 2007 - Sep 2012

      Accountable for all of a unit's assigned equipment and assets. Responsible for tracking, issuing, receipt, shipping, and receiving of US Army equipment.Effectively maintained accountability and managed approximately $1.2 million worth of Explosive Ordnance Disposal equipment across nine off-site locations without lossIntegral in the simplification of the commander's assets through identifying excess equipment and reintegrating it to the U.S. Army for redistribution

Community

You need to have a working account to view this content. Click here to join now