

Dynamic SIGINT and All-Source Intelligence Analyst with 12 years of extensive experience in the US Navy, excelling in advanced signal exploitation, target development and cyber intelligence. Proven track record in leading teams and enhancing mission readiness through analytical thinking and effective communication. Skilled in utilizing advanced systems and tools to identify global threats, ensuring operational excellence and security.
SIGINT Analyst Supervisor on SSEE INC Foxtrot, providing time sensitive SIGINT reporting and training operators during certification events on timeliness of reporting methods and communication requirements.
As SSES Team Supervisor, led 12 US Navy Sailors while conducting OPERATION ROUGH RIDER and OPERATION POSEIDON ARCHER; Managed advanced computers systems to conduct Information Operations, collect, analyze, and exploit signals of interest to identify, locate and report worldwide threats.
Worked with SSEE Increment-F; troubleshot and performed system upgrades on the system and network to keep it operational and maintained.
As Targeting Team Lead, gained experienced working alongside IST Tactical Controller supporting customers globally, analyzing national imagery of MQ-9 Unmanned Aerial Vehicles (UAVs), and building target profiles on High Value Targets (HVTs/HVIs) in support of worldwide counter-terrorism operations.
As a Target Developer, examined potential targets and their relevance to determine best Course of Action for plans of attack.
Reviewed, developed and integrated data from multiple sources; developed analytical reports, briefs, and studies. ID intelligence gaps and developed information collection requirements, tools and methodologies to fill those gaps.
Used a combination of intelligence sources to identify critical targets, including:
Signals Intelligence
Imagery Intelligence
Measurement and Signature Intelligence
Human-Source Intelligence
Open-Source Intelligence
Geospatial Intelligence
Assisted in the collection, analysis, and dissemination of cyber intelligence through conducting routine briefs. Benefited the Cyber Protection Team with information about Advanced Persistent Threats (APTs) and identifying tactics, techniques, and procedures, enhancing defensive cybersecurity mission readiness.
Within three of those years, I gained valuable insights working apart of a Cyber Protection Team conducting threat investigation and analysis for DoD customers to enhance network security. I also developed technical experience contributing to multiple missions and training events with security-related software used to identify malicious activity and network vulnerabilities.
As Ship's Signals Exploitation Space Supervisor, managed advanced computers systems to conduct Information Operations, collect, analyze, and exploit signals of interest to identify, locate and report worldwide threats.
Worked with SSEE Increment-E; troubleshot and performed system upgrades on the system and network for 3 years to keep it operational and maintained.