Jeremy Hawkins
Columbia, SC ***** • 808-***-**** • ****************@*****.***
Professional Summary
Cybersecurity Network and Policy Analyst with 7 years of progressive experience in U.S. Army cyber operations, including 3 years leading brigade-level cybersecurity policy development. Authored and implemented 13 formal policy letters governing cyber defense, risk management, and compliance—directly impacting over 1,000 personnel and safeguarding mission-critical networks. Recognized for translating complex technical requirements into clear, enforceable policy aligned with federal cybersecurity frameworks (NIST, DoD RMF). Proven ability to drive governance initiatives from concept through execution, ensuring operational readiness and legal compliance across large, distributed organizations. Combines deep technical expertise in SCADA/ICS defense, incident response, and SIEM analysis with a strategic approach to policy that is scalable for national-level implementation.
Education
Bachelor of Science: Sports Economics, 05/2014
Louisiana State University And A&M College - Baton Rouge, LA Some College (No Degree): Cyber Security
Joint Cyber Analysis Course (DHG) - Pensacola, FL
Leadership, 02/2023
Advanced Leaders Course (DHG) - Fort Gordon, GA
Military Sciences, 10/2018
Basic Leaders Course (DHG) - Oahu, HI
Work History
156 CPT Team NCOIC, 10/2024 to Current
US Army – Fort Eisenhower
Directed brigade-level cybersecurity operations for SCADA/ICS mission sets supporting national critical infrastructure, including power generation stations, hydroelectric substations, and coal-fire plants.
•
Developed and implemented sensor placement strategies across multiple sites, ensuring alignment with DoD cybersecurity policy and enhancing operational situational awareness.
•
Authored technical data governance procedures for the secure collection, storage, and analysis of terabytes of mission data, directly influencing Battalion and Brigade-level cyber readiness.
•
Utilized Gabriel Nimbus and BDP platforms to perform advanced data analytics, producing actionable intelligence that shaped Brigade-wide cyber defense policy decisions.
•
Applied UCIC-certified expertise to install and configure cross-domain data waterfalls, ensuring secure, policy-compliant transfer of mission-critical data to off-site repositories.
•
Led, trained, and mentored a 31-member cyber operations team, integrating personnel readiness and mission execution with overarching Brigade cybersecurity governance objectives.
•
Coordinated cyber mission planning and execution with multiple command echelons, ensuring Battalion and Brigade operations adhered to established cybersecurity standards and regulatory requirements.
•
Influenced operational policy by translating technical mission outcomes into strategic recommendations for senior leadership, enhancing cybersecurity posture across the Brigade
•
1st Cyber Battalion S3 NCOIC, 07/2023 to 10/2024
US ARMY – Fort Eisenhower, GA
Served as Battalion S3 Master Trainer, leading cybersecurity policy development, enhancement, and implementation initiatives impacting more than 7 Cyber Protection Teams (CPTs).
•
Authored and enforced training policies and governance frameworks to standardize cyber defense procedures across Battalion operations.
•
Leveraged Gabriel Nimbus and BDP to analyze cyber exercise data, producing actionable reports that informed policy updates and closed critical capability gaps.
•
Designed and maintained a customized SCADA/ICS cyber training environment within 1CYBN MECT, enabling realistic, policy-aligned CPT training scenarios.
•
Developed and delivered Splunk ES training curriculum to the entire Battalion, ensuring consistent, compliant use of SIEM capabilities and incident detection processes.
•
Directed the implementation and optimization of virtual data waterfalls, enabling secure, policy-compliant transfer of data from “air-gapped” SCADA/ICS systems for analysis.
•
Built and customized Splunk ITSI glass tables to enhance mission visibility for command leadership, aligning dashboards with operational policy priorities.
•
Created notable event aggregation policies, thresholds, and adaptive response actions to strengthen incident response posture and compliance with DoD cybersecurity standards.
•
Collaborated with Battalion and Brigade leadership to integrate exercise findings into strategic policy changes, ensuring lessons learned were institutionalized at scale.
•
154 CPT Team NCOIC, 04/2019 to 07/2023
US ARMY – Fort Gordon, GA
Led full-spectrum incident response for more than seven critical infrastructure site missions, including dams, power plants, and ammunition production facilities, ensuring rapid recovery and adherence to federal cybersecurity policy.
•
Served as a Senior Network and Senior Host operator, applying advanced technical skills to defend and secure SCADA/ICS systems against emerging threats.
•
Prepared and delivered pre- and post-mission briefings to 1CYBN Command Teams, providing policy- driven recommendations and technical insights to enhance operational readiness.
•
Earned five SANS GIAC certifications (410, 515, 612, 504, 572) in SCADA/ICS and advanced cyber defense, reinforcing credibility as a subject matter expert in industrial control system security.
•
Represented the U.S. Army's technical cybersecurity interests to interagency and industry partners, fostering bi-directional exchange of best practices, threat intelligence, and policy alignment.
•
Developed and refined incident response procedures tailored to SCADA/ICS environments, ensuring compliance with DoD, NIST, and national critical infrastructure security standards.
•
Contributed to policy shaping at the tactical and operational levels by translating real-world mission outcomes into governance improvements for industrial control system defense.
•
Acted as a trusted technical advisor at the forefront of infrastructure cybersecurity, influencing both operational execution and long-term policy for critical infrastructure protection.
•
Certifications
-(Courses Attended) SANS ICS 410, 515, 612, 504, and 572
- Comptia SecurityX Xpert Series Comptia Exp: 06/2028
- Certified Ethical Hacking EC-Council (2025) EC Council Exp: 04/2029
- CASP+ (2024) Comptia Exp: 04/2028
- Pentest+ (2024) Comptia Exp: 02/2028
- Security Onion V2 (2023) Security Solutions Exp: 06/2027
- Security+ (2022) Comptia Exp: 03/2028
- Splunk Core User (2021) Splunk Exp: 06/2027
Skills
Intrusion Detection, Ethical Hacking, Cloud
Security, Data Privacy, Security Audits, Information Security Management
•
Technical Skills: Wireshark, Nessus, Splunk, Splunk ITSI, Splunk Incident Manager, Snort, and RedHat
Linux
•
• In depth:
I have used Wireshark for us to analyze all data
captured during mission to determine and assess
wether or not external IPs are coming into the
network, files are being sent out of network, and
email analysis. I have several years of Wireshark use and experience
•
Security Onion SIEM is the main weapon of
SCADA/ICS CPTs, it is how we hunt, correlate,
develop SNORT rules, STIG compliance, tie data
exfil to SPLUNK CPTs to help analyze and so on
•
Security Audits are done by the ME Lead and ME
NCOIC, of which I have done about seven for
1CYBN and CPB review
•
Splunk and Splunk programs are used by CPTs and
in conjunction with the Data Engineer counterparts. I have worked with Splunk for several years now
and have found it very helpful in understanding
where data is going and what it is doing
•
SCADA/ICS assessment is a specialty of mine given
the sheer volume of sites I have been to and
analyzed. With over 40 sites visited, each site has unique problem sets that I have learned from and
grown from.
•