Justin Small

Intrigued with finding, understanding, and mitigating cyber threats, incubating new ideas, solving problems, and building working systems.
Good knowledge of operating system concepts (UNIX/Linux, Windows, iOS, or Android) such as Security models, File systems, Process management and isolation, Inter-process communication, Networking, Cryptography Computer science fundamentals, and software development best practices
Skilled in using specialized test equipment and network analysis tools (e.g., ping trace-route, network management software, and loopbacks) and including network engineering (i.e., design/analysis of networks, routers, switches, firewalls, Proxies, protocol, IDS/IPS, and SIEM)
Provide consultation on how to leverage intelligence collection systems and data including SIGINT, IMINT, HUMINT, GEOINT, and OSINT.
Knowledgeable with advanced incident response, cyber-attack flows operations, attack tactics, and techniques
Familiarity with methodologies such as the Diamond Model of Intrusion Analysis, Miter ATT&CK framework, OSSTMM, OWASP, NIST SP 800-115, and Lockheed Martin's Kill Chain
Experience with performing cloud (M365, Azure, AWS, GCP, etc.) security monitoring and familiarity with the cloud threat landscape
Skilled at analyzing foreign and domestic-based publicly available information to identify trends, patterns, and relationships that provide unique insights to address defense intelligence requirements.
Strong skills in collecting, organizing, and analyzing large sets of external data known as Big Data or Open Source Intelligence to discover patterns and detect signals of emerging events that may present a risk or opportunity
Knowledge of global events and cybersecurity threats ( ransomware, deep fakes, social engineering, OSINT)
Skilled with open source security tools including, but not limited to Nmap, Nessus, BurpSuite, Cobalt Strike, Metasploit, Wireshark, and Aircrack-ng
Skilled with digital forensics, cloud, endpoint management, and mobile environments.