David Izzo Email and Phone Number
Background: 20 years in military intelligence and cyber operations with the NSA. Leader/Coach: I have led teams of four to over 100 in the conduct of intelligence and cyber operations. Trainer: Effectively trained thousands of people in topics ranging from intelligence analysis to financial management to hacking methodology to performance evaluation.
-
Cyber Threat HunterUnited States Department Of DefenseSan Antonio, Tx, Us -
Cyber Threat Intelligence ManagerNisga'A Tek, Llc Sep 2023 - PresentSan Antonio, Texas, United StatesPart of Cyber Threat Intelligence team conducting assessments of our clients to understand critical assets, most likely threats against those assets, and then develop plans and strategies to mitigate risks. The entire idea is for them to continue operations no matter what. We take data from the field to create overall Threat Model and Cyber Defense Plans and Strategies using MITRE ATT&CK, NIST CSF and other frameworks to structure our strategy. Overall idea of what we do is below:Industry: What industry? What is unique about that industry? Critical Assets: What are the crown jewels, key terrain or critical assets most important to keep the client operating? Potential Threat: Based on all the above and threat intelligence resources, what are the most likely threats to an organization like this? Think like an attacker: Based on the most likely threats and their known TTPs and methodology, how would we attack this organization? Bespoke Defense: Proactively mitigate threat by designing a defense tailored to the client with all known information. -
EntrepreneurshipHanok Ventures Feb 2023 - Oct 2023• Gained practical experience in entrepreneurship, investment analysis, and business development strategies.• Spearheaded effort to formalize onboarding and initial training process for future interns. • Collaborated with cross-functional teams to execute project plans and achieve desired outcomes.• Networking with mentors, executives, and peers to gain insights and expand professional connections.• Conducted in-depth industry research, analyzing trends, competitive landscapes, and emerging technologies. -
Cyber Operations Branch Chief | Exploitation AnalystUnited States Department Of Defense Jun 2019 - Feb 2023San Antonio, Texas, United States• Led over 10 personnel in a cyber operations branch at NSA/CSS Texas. Created and defined new work roles, processes, SOPs, internal/external confluence and JIRA pages to streamline efforts and assist customers. • Served as the primary point of contact for IT/Cyber enterprise in Texas; building strong relationships, ensuring customer satisfaction, and acting as an advisor for work center and management on cybersecurity matters. • Conducted technical onboarding sessions, organizational demonstrations, and training sessions for customers and employees providing relevant information for all new hires. • Used project management tools such as JIRA, Confluence and MS Office for project coordination. • Engaged in cyber threat hunting developing hypotheses of targets, analyzing data sources, profiling targets uncovering access vectors to provide the intelligence on targets informing decision-makers. • Presented over 50 high level presentations to technical/non-technical audiences on cyber operations. • Conducted over 100 cyber operations against Tier 1 adversaries using extensive intelligence analysis correlating data from multiple sources to advance the national security posture and inform decision-makers. • Researched tactics, techniques, and procedures of targeted organizations using intelligence from multiple sources to provide both customers and leaders with timely, relevant, high-quality information. • Prepared Cyber Intelligence products such as power points, white papers, reports, and target profiles for use by management and customers relaying up to date findings on targets. • Collaborated with customers, internal and external partners to execute cyber operations leveraging the power of a shared consciousness enabling the development of novel techniques to successfully. -
Cybersecurity Analyst | Cybersecurity Trainer | ManagerUnited States Department Of Defense May 2013 - Jun 2019Maryland, United States• Enterprise Military Performer of the Year, Awarded Joint Service Commendation Medal for guiding analysis in projects that resulted in the time-sensitive collection of foreign intelligence data against high-valued targets. • Led over 30 people in the conduct of cyber operations against Tier 1 nation-state cyber actors. Coordinated the efforts of cyber professionals to track down and uncover cyber operations around the world. • Uses intelligence sources such as OSINT in the research and analysis of vulnerabilities including evaluating prevalence, exploitability, and threat actor affiliations from the top down in client organizations.• Analyzed TTPs and other evidence of nation-state cyber actors to develop counter-cyber operations. • Conducted extensive research about target adversaries using open-source intelligence (OSINT) combined with extensive knowledge of geo-political situations to provide customers the most accurate information. • Collaboration with customers to maintain cognizance of internal and external needs. Leveraged internal and external people from several offices to bring the full weight of our expertise to bear on problems. • Provided reports and briefings on outcomes of operations for management including lessons learned.• Analyzed network traffic, endpoint activity, to hunt cyber threat actors and report findings to leadership. • Used intelligence requirements to analyze threat actor’s tactics, techniques, and procedures. • Continuous research on new, emerging technologies used by targeted organizations. Characterized cyber networks, evaluating access vectors, and reporting findings to customers and leadership. -
Team Lead | Exploitation AnalystUnited States Department Of Defense Apr 2010 - May 2013Hawaii, United States• Led 15+ joint military, civilian, and contractors in conducting cyber operations in multiple high-priority areas.• Performed intelligence analysis to characterize target networks leading to the execution of hundreds of cyber operations against a Tier 1 adversary gaining incredible new insight while yielding hundreds of reports. • Conducted complex intelligence analysis that produced 200+ reports to alert the Intelligence Community of new attack vectors and uncovered 1,500+ Essential Elements of Information (EEIs). • Processed and analyzed information from multiple data sources to create intelligence products for leadership• Conducted research into targets using open-source intelligence (OSINT) and other tools/platforms • Conducted intelligence analysis assessing, evaluating collection from various sources for value. -
Senior Intelligence AnalystUnited States Department Of Defense Sep 2007 - Apr 2010Pensacola, Florida, United States
David Izzo Education Details
-
International Relations And Affairs -
Cybersecurity And Information Assurance
Frequently Asked Questions about David Izzo
What company does David Izzo work for?
David Izzo works for United States Department Of Defense
What is David Izzo's role at the current company?
David Izzo's current role is Cyber Threat Hunter.
What schools did David Izzo attend?
David Izzo attended Excelsior University, Western Governors University.
Not the David Izzo you were looking for?
-
-
4firstmerit.com, sbcglobal.net, huntington.com, huntington.com
-
2villanova.edu, scouting.org
2 +161078XXXXX
-
David Izzo
Chicago, Il3ecibuild.com, summitdb.com, ujamaaconstruction.com1 +163047XXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial