Post Job Free
Sign in

Cybersecurity

Location:
Binghamton, NY
Salary:
80000
Posted:
July 22, 2025

Contact this candidate

Resume:

Michael Twining

Binghamton, NY ***** 607-***-**** *******.*******@*******.*** linkedin.com/in/michael-twining

CYBERSECURITY ANALYST

THREAT INTELLIGENCE MALWARE ANALYSIS SECURITY OPERATIONS INCIDENT RESPONSE

Driven cybersecurity professional with hands-on experience in malware analysis, threat detection, and AI security research. Demonstrated success leading CTF teams, publishing original research, and automating threat intelligence workflows. Adept in communicating technical findings clearly, investigating system compromises, and applying frameworks such as MITRE ATT&CK and NIST RMF. Passionate about strengthening cyber resilience across public and private sectors while mentoring the next generation of professionals.

Core Competencies: Threat Monitoring & Response Malware Analysis YARA Rules CVE & IoC Correlation SIEM (Splunk, ELK) Incident Documentation Python & Bash Scripting MITRE ATT&CK Security Automation AI/LLM Security Digital Forensics Chain of Custody Vulnerability Management Docker OSINT Shodan

Placed 6th out of 28 Teams at US Cyber Camp CTF, Serving as Team Captain

Ranked in upper 14% of Participants in Correlation One DoD Cyber Sentinel CTF Published Research on AI & LLM Vulnerabilities through National CyberWatch Center

P R O F E S S I O N A L E X P E R I E N C E

ACCO Brands Lake Zurich, IL 2021–Present

Process Improvement Specialist and Forecast Analyst Created multiple workflow and work process improvements through multi-functional business groups, saving a total of over $500k in annual savings and many savings in hours. Forecast accuracy improvements have totaled

$1.2 million in savings.

• Utilized process mining to restructure item creation workflows, eliminating redundancies and implementing PowerAutomate to attach special item documentation and schedule daily company-wide communications.

• Developed a VBA-based application to extract and organize SAP data in Excel, streamlining work scheduling for Sidney and Booneville operations saving over 6 labor hours per day.

• Automated material data audits and SAP-OneWorldSync synchronization using VBA, saving over 4 labor hours per day and 36 hours per full sync cycle.

• Leveraged data analysis to identify POS trends and fine-tune statistical demand forecasting algorithms for a $23M business portfolio. Used Power Query (M-code) and Alteryx to extract and aggregate data from SAP APO, integrating sales trends and seasonality data. Improved forecast accuracy by 5% and reduced OSMI (obsolete and slow-moving inventory) exposure. Utica University Internship Remote 2023–2025

Cybersecurity Intern & Consultant

Consulted under NDA with a security services vendor, providing analysis of control documentation and remediation efforts against HIPAA and NIST 800-53 standards.

• Reviewed NIST 800-53 Rev. 5 control implementations to determine whether remediation and documentation met compliance requirements.

• Analyzed security assessment reports based on NIST 800-53 Rev. 5 and HIPAA requirements to determine if remediation efforts and control documentation met compliance expectations.

• Acted as a second set of eyes for a vendor providing a security service to a client (NDA), validating whether vendors’ controls aligned with documented standards and provided sufficient evidence of risk reduction.

• Provided feedback on control gaps, documentation deficiencies, and recommendations for improving traceability and assurance of implemented solutions.

Olive Garden Vestal, NY

Restaurant Manager

2020–2021

ACCO Brands Sidney, NY

Data Standards Temp

2019–2020

Subway Development of Central New York Binghamton, NY Business Consultant

2017–2019

Ricoh USA Binghamton, NY

Commercial Account Executive

2016–2017

Auxilliary Services of SUNY Cortland Cortland, NY Dining Services Supervisor

2014–2016

P R O J E C T S

THREAT INTEL AND MALWARE ANALYSIS LABS FREELANCE

• Analyzed and created write-ups on malware families including LokiBot, TrickBot, and ransomware variants.

• Disassembled and examined .bin and .xlsm malware samples; extracted shellcode, strings, and embedded payloads.

• Used hybrid-analysis.com and offline sandboxes to safely observe malware behavior.

AI SECURITY INITIATIVES CAPSTONE SCHOOL PROJECT

• Explored security risks in LLMs using NotebookLLM and Ollama; demonstrated jailbreak chains and hallucinated exploit vectors.

• Developed educational content addressing hallucinations, jailbreaks, and adversarial input in generative AI, now being used for the CYB 125 course at Utica University.

GITHUB AI TOOL FREELANCE

• Developed and published an AI-driven research assistant tool on GitHub to streamline structured question answering and reference generation.

• Built using Python and Google API to enable multi-modal, LLM-enhanced queries for academic research

• Integrated citation-aware workflows that align outputs to source material, improving trust and transparency in AI responses.

• Published as open source under ResearchAI: https://github.com/usrtem/ResearchAI

E D U C A T I O N

UTICA UNIVERSITY UTICA, NY

Bachelor’s of Science in Cybersecurity 2024

Relevant Coursework: Digital Forensics, Network & System Penetration Testing, Secure Software Design, Malware Analysis, Information Assurance, Linux Forensics, AI in Cybersecurity, Network Security Monitoring, Incident Response, Computer Science

C E R T I F I C A T I O N S

Certified in Cybersecurity (ISC )

CompTIA Security+

Certified in Cloud Security Knowledge (CSA)

OSINT (InfraGard)

Infrastructure Liaison Officer (InfraGard)

T E C H N O L O G Y

LANGUAGES/TOOLS: Python, Bash, PowerShell, SQL, PE Studio, YARA, Volatility, x64dbg, Shodan, CyberChef, Wireshark, Splunk, Metasploit, Nmap, Hybrid Analysis, Docker, ChatGPT, NotebookLLM, MISP, Visual Basic for Applications, PowerAutomate, Tableau

SYSTEMS/FRAMEWORKS: Kali Linux, Ubuntu, Windows, pfSense, VirtualBox, VMware, ELK Stack, MITRE ATT&CK, NIST CSF/RMF, HIPAA, HITRUST, PCI DSS



Contact this candidate