Cameron Kennedy
Top Secret/SCI, Active DHS EOD
EXECUTIVE SUMMARY
Cybersecurity professional experienced in leading unique analytical and investigative issues. Strong supervisory skills evident in developing staff members to perform at peak levels. Proven ability to create detailed analysis, partner with business and IT to implement solutions that turn challenges into results, mitigate risks, and enhance organizational effectiveness.
Cyber skillset
•Detection Engineering
•OSINT Investigations
•Excellent Oral and Written Communication
•Threat Hunting
•Threat infrastructure monitoring
•SIEM Tools
•Malware research
•Adversary Network Development
•Threat Intelligence Repositories
Signature Achievements
Instrumental in researching, analyzing, and writing over 60 threat intelligence products which were utilized to implement stronger security for Senate networks.
Trained and advanced the skills of a team of more of 70 members on how to properly use intelligence tools and methodologies.
Founding member of USPS Risk Based Alert team and co-wrote over 100 unique Splunk detections which substantially lowered the USPS Operations branch’s risk score.
Reviewed, analyzed, and mapped over 160 data objects for intelligence value and created analysis of data metrics for each object culminating in a 41 page data audit report designed to enhance data sharing.
EDUCATION
Bachelors of Arts in Political Science, Political Science
Ashford University, Clinton, IA
US Army Primary Leadership Development Course
Ft. Benning, GA
GIAC Cyber Threat Intelligence
SANS Digital Forensics Essentials
WORK EXPERIENCE
Intelligence Analyst Oct 2005- Present
DHS CISA Capacity Building (CB), Deputy PM (December 2022 – Present) Washington, DC
Supervise and mentor a team of 6 junior analysts in both day-to-day client duties as well as guiding them through professional training and improvement programs on the CISA VM Insights program supporting Risk and Mitigation. Collaborate with prime contract leadership to ensure all KPIs are being met and the analysts are well representing phia both technically and professionally.
As part of billing duties for Capacity Building conduct on site research, compilation, analysis, and production of cyber threat intelligence (CTI) standards mapping products which aligned 46 different standards and workflows across more than 100 different data objects. Provide expertise on cyber threat intelligence, analysis, and best practices. Support to Automated Indicator Sharing (AIS) platform working to ensure the system and service provide actionable indicators of compromise (IOCs) and relevance in machine readable formats.
USPS Cyber Threat Intelligence Analyst (June 2019 – December 2022) Washington, DC
Provides expertise for developing and implementing the Corporate Information Security Office’s cyber threat intelligence capability, federated across multiple operational units. Conducts research and evaluate technical and all-source cyber intelligence to develop in-depth analysis and assessment on threats to critical networks and critical infrastructure. Analyzes network events to determine the impact on current operations and conduct all-source research to determine adversary capability and intent. Analyzes commercial and open-source intelligence feeds, adding context, and sharing key findings through formal and informal executive briefings. Develops and update Splunk queries/dashboards. Creates and supports data processing pipelines and storage systems for threat intelligence data. Partnered with security application owners, CSOC analysts, security engineers, and management to create and deploy risk rules under the Risk Based Alerting methodology. Researched, designed, tested, and tuned over 100 custom Splunk-based detections tailored for the client’s network. Reduced a severely high alert pipeline in the CSOC to a manageable amount with a substantially increased true positive rate.
Family Caretaker (May 2018-June 2019)
Cyber Threat Intelligence Analyst (January 2017 – May 2018)
United States Senate, Washington, DC
Lead analyst to identify trends, assess future threats and risks, and prepare senior leaders briefings on mission critical insights. Played key role in reviewing system logs, collecting and analyzing indicators of compromise (IOC) and defending targeted networks from potential nation-state Advanced Persistent Threat and criminal cyber-attacks. Partnered with Security Operations Center personnel to evaluate collected intelligence data for the purpose of providing network security support and enabling the senior leader-level decision making process. Conducted passive and active threat hunting in support of CSOC operations.
Intelligence Analyst (August 2015 - September 2016)
Joint Improvised Threat Defeat Agency, Reston, VA
Developed and tested web-based tools that were designed for analyzing large data volumes. Mentor and train defense team utilizing pertinent tools and methodologies to ensure broad understanding of mission goals. Identified new system requirements from field-based users and worked with developers to implement technology and process improvements.
Intelligence Analyst (November 2013 - June 2015)
Joint Special Operations Command, Fort Bragg, NC
Analyst responsibilities included supporting, coordination and providing intelligence to special operations, combatant command, and other necessary intelligence members and organizations. Tasked with monitoring terrorist cells and networks in the southwest and southeast regions of Asia to track and predict their activities. Wrote and maintained proper documentation for special products.
Key Achievements:
Created senior level briefings to depict trends, techniques, procedures, and motivations of said terrorist cells and networks.
Participated in special working groups in coordination with intelligence professionals focusing on the South and Southeast Asia in order to prepare friendly forces to respond to adversarial networks.
Counter-Intelligence Analyst (October 2012 - September 2013)
United States Central Command,Ft Devens, MA
Identified potential inside the wire; threats utilizing cross-database comparisons and research to
create analytical products briefed to Coalition Forces.
Analyzed insurgent networks to identify and exploit potential leads into the network for further
analysis and exploitation.
Created in-depth briefings on networks, activities, members, and potential threats which were utilized
in command level presentations.
Intelligence Analyst (May 2011 - April 2012)
United States Special Operations Command, AFG
Analyst support for operations and assisted collectors in developing collection plans. Conducted document and media exploitation. Collaborated with multiple US and British military and intelligence agencies. Partnered with multiple collection assets to find, develop, target, and exploit numerous networks. Produced and successfully executed multiple targeting packets.
Key Achievements:
Wrote and co-produced hundreds of intelligence documents for the command as well as multiple widely released intelligence reports for the Intelligence Community.
All Source Intelligence Analyst, Sergeant (E5) (October 2005 - March 2011)
United States Army
Conducted multiple analysis that focused on threat analysis. Contributed expertise in creating threat assessments. Responsible for researching, analyzing, planning, producing and disseminating intelligence products. Trained team members on multiple task to include developing skills on how to perform all-source analysis, tactical level operations and responsibilities:
Key Achievements:
Produced and briefed to senior leaders over 230 intelligence products in support of US Army Central operations.