Jrlambertiii
@CylentK
CylentKnight
Jack R. Lambert
Cyber Security SME
Peyton, CO 80831
*********@****.***
Lambert - GEN2020-7
About Me
Over the past 17 years I’ve aimed to develop my experience in virtually every domain of Information Technology with the goal of putting it all together as an information security subject matter expert. With the range of knowledge I’ve been able to build over the years, I’m able to effectively secure IT devices by developing technical, managerial and administrative mitigations in virtually all types of enterprise environments. I strive to constantly challenge myself to not only become a better operator but also a better mentor to young aspiring security professionals. Education and Certifications
B.S. – Information Assurance and Security
Capella University
A.S – Computer Science
Community College of the Air Force
CompTIA Advanced Security Practitioner CE (CASP)
Valid Through September 2021
EC Council Certified Ethical Hacker (CEH)
Valid Through November 2020
CompTIA Cyber Security Analysis Plus (CySA+)
Valid Through December 2022
CompTIA Security Plus CE (Sec+)
Valid Through December 2022
CompTIA Network Plus CE (Net+)
Valid Through December 2022
CompTIA A plus CE (A+)
Valid Through December 2022
Skills & Qualifications
• 17 years combined IT experience spanning several career domains
• Active TS/SCI Clearance adjudicated in 2018 and 8570 compliant: IAT 3, IAM 2, IASAE 2, CSSP
• Competent with both Windows and Linux enterprise environments
• Experience with scripting and programming languages such as PowerShell, Python, bash, C, and C++
• Capable of leading teams of highly skilled individuals to accomplish department objectives
• Experienced in developing high level policy and procedures to improve operational security
• Able to deliver quantifiable results using a product based approach to operations
• Experience with SP 800-53, CJCSM 6510, ESM 9 and 10 operations and compliance requirements
• Experienced with binary analysis and exploitation using tools such as GDB, Ghidra and IDAPro
• Skilled at web enumeration and exploitation using methods such as code or SQL injection
• Capable of automating exploits using open source tools such as Python Pwntools
• Adept with other common tools such as Burp Suite, GoBuster, Nmap, Metasploit
• Able to perform physical security avoidance such as lockpicking, lock bypassing and RFID cloning
• Adept at crafting training scenarios which emulate the tactics of real world threat actors
• Experience creating Insider Threat, Virus, Worm and Ransomware simulations for training purposes
• Able to evaluate exercise results to improve operator training as well as identify new technical needs
• Experienced in the Protect, Detect and Respond facets of Defensive Cyber Operations (DCO)
• Competent with DCO frameworks such as the Cyber Kill Chain and Mitre ATT&CK
• Skilled with tools such as Snort, Wireshark, TCPDump, Zeek (Bro), SolarWinds, and HBSS
• Direct experience with SIEM’s such as ArcSight, LogRhythm and ELK stack platforms (Security Onion) Jack Raymond Lambert III
Peyton, CO • *********@****.*** • 307-***-****
Work History
Lead Cyber Protect/Detect Operator – 50th Space Communications Squadron Cyber Defense Technologies
Schriever AFB, CO
February 2018 - Present
Responsibilities
Provide proactive protection of 14th Air Force space mission assets by conducting vulnerability assessments and developing new tools, signatures and procedures to mitigate risk. This included analyzing purpose built software, conducting asset baselines and enumerating patching levels in order to develop IDS and HIPS signatures or recommend other mitigation actions. In addition, it was my responsibility to develop purple team exercises employing custom built malware simulation tools to assess defensive response capabilities. Achievements
• Developed several custom tools to include a case management system and pcap collection tool
• Promoted from defense analyst to protect operator and again to lead protect operator
• Created two procedures for interdepartmental communication, improving incident response capabilities
• Awarded the first ever “Analyst of the Month” award recognizing activities that went “above and beyond”
• Hand selected to consult on the Operating Instruction and derive processes for the new CDCC-S department
• Developed several SOP’s to guide young analysts key active hunt techniques such as pcap analysis Cyber Security Engineer II – JRDC Missile Defense Agency CTL Resources
Schriever AFB, CO
May 2017 – February 2018
Responsibilities
Performed Tier II Defensive Cyber Operations (DCO) for the Missile Defense Agency Cyber Security Service Provider
(CSSP). Continuously Monitored all network events into and out of the network to detect and respond to any situation which may threaten network security. This function encompassed full security stack devices to include Firewall operations, IDS, Content filters, Email Monitoring, and host based security products such as HIPS, anti-malware software and OS logs. Also, responsible for directing response actions to TIER III per Incident Response Plan. Achievements
• Automated 3 work center processes in 3 months, saving an estimated $75,000 in man hours per year.
• Provided outstanding technical contribution to the team which lead to several organizational awards
• Created a video training series on ArcSight SIEM operation to expedite new operator comprehension Network Engineer I – JRDC Missile Defense Agency
CTL Resources - TEKSystems
Schriever AFB, CO
December 2015 – May 2017
Responsibilities
Operation and maintenance of the MDA general service network infrastructure. Performed regular network and firewall monitoring and provided immediate response functions for outages, misconfigurations or cyber incidents. Implemented architecture and configuration changes to ensure STIG, IAVA and CSSP compliance. Regularly setup and troubleshot 802.1x port authentication as well as configured and troubleshot Access Control Lists (ACL). Achievements
• Redesigned the departments training documentation schema; vastly improving department work continuity
• Streamlined a weekly inter-department workflow process, which improved operational capacity
• Awarded an “Outstanding Achievement” medal for meeting organizational needs beyond the position’s scope Jack Raymond Lambert III
Peyton, CO • *********@****.*** • 307-***-****
Lead Systems Analyst – Global Broadcast Service Operations Center TEKSystems
Schriever AFB, CO
August 2015 – November 2015
Provide 24/7 end user support to Global Broadcast Service customers. More details about this position are available upon request
• Updated several work center procedures to reflect present day operational needs Systems Administrator – DoDMERB
22nd Century Technologies
USAFA, CO
May 2015 – August 2015
Monitored and maintained department physical IT resources to include Database, Active Directory, DNS, DHCP and Exchange servers. More details about this position are available upon request.
• Rapid response to an afterhours lightning strike prevented the loss of over $750k in equipment Systems Analyst – United States Air Force Academy Astronautics Department Apogee Engineering
USAFA, CO
October 2013 – April 2015
A multi-disciplinary role to include network operations, server administration, cyber security, satellite operations for the USAFA Astronautics department. More details about this position are available upon request.
• Detected and responded to over 400 malicious activity attempts which threatened a $34M R&D program Field Service Engineer – Afghanistan
Tachyon Networks
Bagram, Afghanistan
November 2010 – December 2012
A single deep position building and maintaining two satellite communications hubs supporting ISR missions over Afghanistan. More details on this position are available upon request.
• Worked with a team of engineers to design an application to provide real time system health information Associate Engineer
EchoStar Communications
Cheyenne, WY
November 2009 – November 2010
Primary duties included the maintenance and operation of 1500 pieces of communications equipment supporting over 3000 services from television broadcasts to satellite internet. Additional details available upon request.
• Created a task automation script which saved the organization over $40,000 annually Satellite Communications Technician – 2E151
United States Air Force
Shaw AFB, SC
November 2003 – November 2009
Responsible for ensuring unit readiness for Satellite Communications equipment. Honorable discharge. Additional details available upon request.
• Awarded Airman of the Quarter for outstanding work, team contribution and community involvement Jack Raymond Lambert III
Peyton, CO • *********@****.*** • 307-***-****
Volunteer Work
Founder
Hackers N’ Hops
International
May 2018 - Present
Hackers N’ Hops was founded to provide people with a passing interest in Information Security a space to experience and learn the tools and techniques of offensive security. The group quickly grew from the original 5 members to over 100 members spanning 6 countries today. We use public platforms such as Hack the Box, Try Hack Me and global Capture the Flag (CTF) competitions to keep our skills sharp and offer various rewards to our members for their learning efforts.
• Twitter @HackersNHops
• Web https://hackersnhops.com
References
Terence Brown
Wylie Bayes
Mike Bates
*Alternate contact information and personal references are available upon request.