Post Job Free
Sign in

Sensor Security Lead Architect and Malware SME

Location:
Phoenix, AZ
Salary:
200k+
Posted:
April 04, 2023

Contact this candidate

Resume:

S. CHRISTIAN DENCKLAU

Prescott, AZ *****402-***-**** ● cree1069 @email.com

Senior Malware Reverse Engineer with over a decade of experience in the examination, identification and understanding of cyber threats such as viruses, worms, bots, rootkits and Trojan horses

Chief Engineering Architect integrating complex DoD systems with total budget acquisitions experience, technical derivatives impacting effective and secure systems integration, working with ever changing senior leadership in an agile environment goal within an established military

Proactive in preventing and containing malware infestation to protect network software and hardware integrity as well as proprietary data.

Proficient with interpreted and compiled programming languages with a keen understanding of both reverse engineering and software development to recover any potential damage

Honed leadership skills and efficiency in DEVops, mission operations and data flow for adversary life cycles; developed through numerous supervisory positions within the intelligence community, collaborations with Department of Defense (DoD) organizations and cross functional organizational teams

Training and Certification

CURRENT TS/SCI CLEARANCE (Full-Scope Polygraph) Latest completion, July 2019

Computer Engineering Systems Design – Thomas Edison University, December 2022

Malware Exploitation Reverse Engineer – USCYBERCOM, February 2022

Scale Agile Project Owner – Agile counsel, July 2021

Agile Scrum Product Owner – Leading Agile, May 2017

Network Warfare Cyber Planner/Weaponeer – USCYBERCOM, September 2015

Malware Analyst – NSA/Tailored Access Operations, December 2012

Test Engineer - NSA/Tailored Access Operations, August 2009

Computer Network Defense – USS ENTERPRISE (ENTERPRISE STIRKE GROUP) – 2008

Network and Switch Engineer/Vulnerability Technician, NIOC Virginia – 2005 - 2007

Network Installation and PC Hardware Technician, NTTC Corry Station – 2003 - 2004 PROFESSIONAL EXPERIENCE

US Navy stationed at Naval Operations Base Norfolk, Virginia 2005-2008

US Navy stationed at Fort Meade, Maryland 2009 – Present

Senior Capabilities Lead - cyber warfighter advocate

Associated advocacy responsibilities include: identifying capability gaps across COCOMs, participating in or providing supervision over requirement definition analytic efforts and processes, exploring/analyzing future concepts, prioritizing potential DOTMLPF solutions, conducting cost/benefit analyses, recommending future investment strategies and developing required COCOM PPBE products. Tasks require routine interface with Joint Staff, Agencies, Capability Portfolio Managers, and Service Cyber Components and other COCOMs. Responsible for the tracking and analysis of a wide variety of Cyberspace programs throughout DoD's PPBE process. Coordinates on USCYBERCOM reclamas related to Service and DoD programmed decisions. Identifies critical deficiencies and provides recommendations on major budget issues raised to the SECDEF/DEPSECDEF. Helps prepare and approve formal reclamas to OSD budget and program decisions, congressional authorizations and appropriations.

Agile Capabilities Portfolio Manager advising 700 Million Dollar National Defense Authorizations Act and leading 7 million dollar budget with capabilities Reverse Engineer

Analyze malicious code by conducting reverse engineering techniques and employing tools and scripting languages as well as virtual machine and networking software. Identify the methodology of hackers posing a potential threat to customer networks and systems. Document results in time-sensitive reports, presentations and analyst exchanges. Select Accomplishments:

(2020-2023) Program Lead Architect and Action Officer for the Joint Development Environment, Joint Cyber Weapons and the Joint Cyber Threat Intelligence platform under the Joint Cyber Warfare Arena managed by the Strategic Joint Cyber Management Office for Deputy USCYBERCOM. Integration of Sensors, Command and Control, Malware Reverse Engineering with Threat Intelligence Platform in its Big Data Platform.

(2021) Project lead and software integration engineer for the Deparment of Defense USCYBERCOM’s effort to create an automated low equity capabilty/effects for computer network operations. Implemented milestones effort and sectional use of a platform for capability/effects of a binary re-purposing system for USCYBERCOM in mission operations.

(2020) Action Officer and Staff Weaponeer for Navy Pacific Fleet (PACFLT) designed a weaponeer’s end to end mission profile ideal in six months

(2017- 2020) Established, implemented and achieved “Authority to Operate” an enterprise system of automated malware analysis product for USCYBERCOM and DoD. System is implemented into the DoD as the overarching automated analysis and repository for malware in the cyber operations joint environment.

(2019) Established and created the malware analysis team of 35+ malware exploitation and reverse engineers (MERE) for the Cyber National Mission Forces.(2016) Conceived, scoped and led team of capability developers for USCYBERCOM to produce a suite of 45+ capabilty and effects against a networked computer operating system used in over 500 cyber effects operations against Tier 1 adversaries engaged in malicious cyber activities.

(2012-2014) Co-founded and led over 25 malware analysts as Non-Commissioned Officer in Charge (NCOIC) the binary analysis team within NSA for direct malware and forensic support to computer network operations. Led team to complete malware analysis and reporting for over a record breaking analysis of 5500+ binary files in a 12 month period in the first year established. Created and standardized training for malware analyst and core competency levels within the NSA. As well as established standardized reporting templates for triage, in-depth and reverse engineering shared findings reports.

(2011-2012) FLTCYBER Liaison to USCYBERCOM reporting on computer incidents and technical details background to Senior Leadership.

(2009-2011) Senior Software Test Engineer tested new code for integration to Computer Network Operations missions, vulnerability analysis and reported on efficiencies, providing feedback for design engineers.

EDUCATION

University of Nebraska at Omaha; Primary Discipline in Physics 1990-1993 CORE SKILLs:

efficiency expert, agile trained and thriving in innovation environments; considering all the detailed alternatives and research making the most cost effective and agile process and products to integrate into complex systems and deliver on time

Reverse Engineering/Leading technical/Conceiving new capability to delivery of mission

Capability pairing and leader in projects while multitasking analysis of malware, product owner and mission leader

REFERENCES:

Major General Nakasone Commander USCYBERCOM/Director Of National Security Agency (NSA)– US Army

Vice-Admiral (RET) Timothy J White USFLTCYBERCOM Commander-US Navy (USN)

Rear Admiral James Butler US PACIFIC FLEET Commander -USN

Michael T. Burke Technical Director Cyber National Mission Force - NSA

General Benjamin Ring Joint Cyber Management Office USCYBERCOM- US Army

Peter Hay CoFounder RESOVN

Karl Gumtow CEO of Cyberpoint and Chief Operations Officer of Dreamport/MiSi

Captain Michael Tyree -USN

Captain Sharon T. Pinder Commander Cyber Strike Activity -63 -USN

Captain Micheal Herlands – C10F Acquisitions and Commanding Officer NCWDG - USN

Commander Christopher L Liu -USN

Andrew Newton Technical Director of Intelligence Cyber National Mission Force - NSA

Master Chief Cryptology Technician Networks Nicholas Lopez; Functional Mission Lead Fleet Forces Command Pentagon – USN

Master Chief Cryptology Technician Networks (RET) Michael Gay; Senior Enlisted Leader USCYBERCOM – USN

Master Chief Cryptology Technician Networks (RET) Herbert “Ken” Lamb; Senior Enlisted Leader Cyber Strike Activity-63 – USN

Petty Officer First Class Jarrett Vignati Exploitation Analyst Cyber Mission Forces – USN

Kyle Alexander CEO of Wolfram Technologies

Andrew Sathern CEO of Positive Proximity Technology

Jeffrey Baker CEO of Biznet

Gary Bails Program Manager of Technology Innovation Start ups - Amazon



Contact this candidate