S. CHRISTIAN DENCKLAU
Prescott, AZ ***** ● 402-***-**** ● cree1069 @email.com
Senior Malware Reverse Engineer with over a decade of experience in the examination, identification and understanding of cyber threats such as viruses, worms, bots, rootkits and Trojan horses
Chief Engineering Architect integrating complex DoD systems with total budget acquisitions experience, technical derivatives impacting effective and secure systems integration, working with ever changing senior leadership in an agile environment goal within an established military
Proactive in preventing and containing malware infestation to protect network software and hardware integrity as well as proprietary data.
Proficient with interpreted and compiled programming languages with a keen understanding of both reverse engineering and software development to recover any potential damage
Honed leadership skills and efficiency in DEVops, mission operations and data flow for adversary life cycles; developed through numerous supervisory positions within the intelligence community, collaborations with Department of Defense (DoD) organizations and cross functional organizational teams
Training and Certification
CURRENT TS/SCI CLEARANCE (Full-Scope Polygraph) Latest completion, July 2019
Computer Engineering Systems Design – Thomas Edison University, December 2022
Malware Exploitation Reverse Engineer – USCYBERCOM, February 2022
Scale Agile Project Owner – Agile counsel, July 2021
Agile Scrum Product Owner – Leading Agile, May 2017
Network Warfare Cyber Planner/Weaponeer – USCYBERCOM, September 2015
Malware Analyst – NSA/Tailored Access Operations, December 2012
Test Engineer - NSA/Tailored Access Operations, August 2009
Computer Network Defense – USS ENTERPRISE (ENTERPRISE STIRKE GROUP) – 2008
Network and Switch Engineer/Vulnerability Technician, NIOC Virginia – 2005 - 2007
Network Installation and PC Hardware Technician, NTTC Corry Station – 2003 - 2004 PROFESSIONAL EXPERIENCE
US Navy stationed at Naval Operations Base Norfolk, Virginia 2005-2008
US Navy stationed at Fort Meade, Maryland 2009 – Present
Senior Capabilities Lead - cyber warfighter advocate
Associated advocacy responsibilities include: identifying capability gaps across COCOMs, participating in or providing supervision over requirement definition analytic efforts and processes, exploring/analyzing future concepts, prioritizing potential DOTMLPF solutions, conducting cost/benefit analyses, recommending future investment strategies and developing required COCOM PPBE products. Tasks require routine interface with Joint Staff, Agencies, Capability Portfolio Managers, and Service Cyber Components and other COCOMs. Responsible for the tracking and analysis of a wide variety of Cyberspace programs throughout DoD's PPBE process. Coordinates on USCYBERCOM reclamas related to Service and DoD programmed decisions. Identifies critical deficiencies and provides recommendations on major budget issues raised to the SECDEF/DEPSECDEF. Helps prepare and approve formal reclamas to OSD budget and program decisions, congressional authorizations and appropriations.
Agile Capabilities Portfolio Manager advising 700 Million Dollar National Defense Authorizations Act and leading 7 million dollar budget with capabilities Reverse Engineer
Analyze malicious code by conducting reverse engineering techniques and employing tools and scripting languages as well as virtual machine and networking software. Identify the methodology of hackers posing a potential threat to customer networks and systems. Document results in time-sensitive reports, presentations and analyst exchanges. Select Accomplishments:
(2020-2023) Program Lead Architect and Action Officer for the Joint Development Environment, Joint Cyber Weapons and the Joint Cyber Threat Intelligence platform under the Joint Cyber Warfare Arena managed by the Strategic Joint Cyber Management Office for Deputy USCYBERCOM. Integration of Sensors, Command and Control, Malware Reverse Engineering with Threat Intelligence Platform in its Big Data Platform.
(2021) Project lead and software integration engineer for the Deparment of Defense USCYBERCOM’s effort to create an automated low equity capabilty/effects for computer network operations. Implemented milestones effort and sectional use of a platform for capability/effects of a binary re-purposing system for USCYBERCOM in mission operations.
(2020) Action Officer and Staff Weaponeer for Navy Pacific Fleet (PACFLT) designed a weaponeer’s end to end mission profile ideal in six months
(2017- 2020) Established, implemented and achieved “Authority to Operate” an enterprise system of automated malware analysis product for USCYBERCOM and DoD. System is implemented into the DoD as the overarching automated analysis and repository for malware in the cyber operations joint environment.
(2019) Established and created the malware analysis team of 35+ malware exploitation and reverse engineers (MERE) for the Cyber National Mission Forces.(2016) Conceived, scoped and led team of capability developers for USCYBERCOM to produce a suite of 45+ capabilty and effects against a networked computer operating system used in over 500 cyber effects operations against Tier 1 adversaries engaged in malicious cyber activities.
(2012-2014) Co-founded and led over 25 malware analysts as Non-Commissioned Officer in Charge (NCOIC) the binary analysis team within NSA for direct malware and forensic support to computer network operations. Led team to complete malware analysis and reporting for over a record breaking analysis of 5500+ binary files in a 12 month period in the first year established. Created and standardized training for malware analyst and core competency levels within the NSA. As well as established standardized reporting templates for triage, in-depth and reverse engineering shared findings reports.
(2011-2012) FLTCYBER Liaison to USCYBERCOM reporting on computer incidents and technical details background to Senior Leadership.
(2009-2011) Senior Software Test Engineer tested new code for integration to Computer Network Operations missions, vulnerability analysis and reported on efficiencies, providing feedback for design engineers.
EDUCATION
University of Nebraska at Omaha; Primary Discipline in Physics 1990-1993 CORE SKILLs:
efficiency expert, agile trained and thriving in innovation environments; considering all the detailed alternatives and research making the most cost effective and agile process and products to integrate into complex systems and deliver on time
Reverse Engineering/Leading technical/Conceiving new capability to delivery of mission
Capability pairing and leader in projects while multitasking analysis of malware, product owner and mission leader
REFERENCES:
Major General Nakasone Commander USCYBERCOM/Director Of National Security Agency (NSA)– US Army
Vice-Admiral (RET) Timothy J White USFLTCYBERCOM Commander-US Navy (USN)
Rear Admiral James Butler US PACIFIC FLEET Commander -USN
Michael T. Burke Technical Director Cyber National Mission Force - NSA
General Benjamin Ring Joint Cyber Management Office USCYBERCOM- US Army
Peter Hay CoFounder RESOVN
Karl Gumtow CEO of Cyberpoint and Chief Operations Officer of Dreamport/MiSi
Captain Michael Tyree -USN
Captain Sharon T. Pinder Commander Cyber Strike Activity -63 -USN
Captain Micheal Herlands – C10F Acquisitions and Commanding Officer NCWDG - USN
Commander Christopher L Liu -USN
Andrew Newton Technical Director of Intelligence Cyber National Mission Force - NSA
Master Chief Cryptology Technician Networks Nicholas Lopez; Functional Mission Lead Fleet Forces Command Pentagon – USN
Master Chief Cryptology Technician Networks (RET) Michael Gay; Senior Enlisted Leader USCYBERCOM – USN
Master Chief Cryptology Technician Networks (RET) Herbert “Ken” Lamb; Senior Enlisted Leader Cyber Strike Activity-63 – USN
Petty Officer First Class Jarrett Vignati Exploitation Analyst Cyber Mission Forces – USN
Kyle Alexander CEO of Wolfram Technologies
Andrew Sathern CEO of Positive Proximity Technology
Jeffrey Baker CEO of Biznet
Gary Bails Program Manager of Technology Innovation Start ups - Amazon