Erik Grant, Cissp

Erik Grant, Cissp Email and Phone Number

Head of Operations (Volunteer) @ Human Trafficking Service Center
Huntsville, AL, US
Erik Grant, Cissp's Location
Huntsville-Decatur-Albertville Area, United States, United States
Erik Grant, Cissp's Contact Details

Erik Grant, Cissp work email

Erik Grant, Cissp personal email

n/a
About Erik Grant, Cissp

Currently employed Red Team operator. Retired military officer and meticulous professional with over 20 years combined experience in Information Technology and Intelligence Analysis. Ability to investigate and solve complex technical problems quickly with a proven ability to excel in and master diverse fields. Experienced with exploitation and dissemination of all-source intelligence products. Ability to work independently or as part of a team. Strong technical background and problem-solving skills. Excellent verbal and written communication skills. Top performance awards in intelligence and technical analysis. Current Top Secret clearance in an SCI billet with a CI Poly. Core competencies include:Red Team operations - Computer forensics - Software Reverse Engineering – Open Source Intelligence (OSINT) – Vulnerability Testing – Exploit Development – Intelligence Analysis

Erik Grant, Cissp's Current Company Details
Human Trafficking Service Center

Human Trafficking Service Center

View
Head of Operations (Volunteer)
Huntsville, AL, US
Website:
htscinc.com
Employees:
1
Erik Grant, Cissp Work Experience Details
  • Human Trafficking Service Center
    Head Of Operations (Volunteer)
    Human Trafficking Service Center
    Huntsville, Al, Us
  • Millennium Corporation
    Red Team Security Engineer/Reverse Engineer
    Millennium Corporation Feb 2024 - Present
    Arlington, Va, Us
    Emulates adversary cyber tactics, techniques, and procedures (TTPs) to ascertain security posture of DoD networks and weapon systems. Deploys remotely or locally as part of an NSA certified Red Team. Maintains proficiency in Red Team operations by on-site training and mentoring and individual research. Conducts vulnerability and exploit research as directed by senior team members. Tests target networks and systems via common tools such as Cobalt Strike, nmap, Mimikatz and Kali Linux.
  • Millennium Corporation
    Senior Cyber Security/Forensics Engineer
    Millennium Corporation Jun 2021 - Jan 2024
    Arlington, Va, Us
    Performed computer and network forensics on systems to ascertain detectability and survivability of binaries. Inspected compromised systems/networks using Autopsy, FTK Imager, and other native tools. Served as the subject-matter expert on proprietary, highly specialized software. Analyzed target software utilizing Ghidra, Wireshark, binwalk, and additional classified tools to ascertain suitability for designed purpose. Configured, tested, and deployed Docker containers and virtual machines as required. Wrote and tested YARA rules to help verify binary suitability for targeted implementation. Supported Red Team missions as required, performing reverse engineering of binaries and other tasks as needed. Acted as the primary coordinator between geographically separate teams to synchronize efforts in response to operational demands. Briefed stakeholders and corporate leadership on program status and vectored efforts to meet project milestones. Authored reports and presentations providing corporate leadership and other stakeholders with program details and progress.
  • Human Trafficking Service Center
    Head Of Operations (Volunteer)
    Human Trafficking Service Center Jul 2022 - Present
    New Castle, Pa, Us
    Leads a three person team conducting HTSC’s Operations and outreach. Plans and conducts Open Source Intelligence (OSINT) surface web and darknet research in support of HTSC’s Alabama and Pennsylvania teams. Develops intelligence products, including reports and briefings, for use in awareness campaigns and internal training. Coordinates with HTSC senior staff weekly in order to share operational and administrative data and plan for future events. Performs reconnaissance on suspected trafficking locations and other facilities. Develops training plans and onboarding procedures for new members. Manages social media and chat platforms (Discord), updates channels with pertinent information, and moderates discussions and responses. Performs outreach with local law enforcement, other anti-trafficking organizations, and women’s shelters. Develops and conducts in-person and remote (Zoom) training sessions on anti-trafficking areas to include cyber, surface and deep/dark web research.
  • Raytheon Intelligence & Space
    Principal, Cyber Triage
    Raytheon Intelligence & Space Aug 2019 - May 2021
    Arlington, Va, Us
    Lead a team of subject-matter experts focused on reverse-engineering foreign air, space and cyberspace-related military systems at the National Air and Space Intelligence Center's (NASIC) Foreign Material Exploitation (FME) facility. Coordinated with stakeholders to identify desired outcomes of exploitation, identified research areas, and vectored team efforts to discover potential vulnerabilities. Forensically acquired target system firmware and software using commonly available toolsets such as FTK and X-Ways Forensics. Analyzed target binaries using Ghidra, IDA Pro and other additional common tools. Assisted in developing and testing Ghidra modules and scripts for use with new architectures and chipsets. Monitored team progress against project milestones and adjusted manning and focus as needed
  • Booz Allen Hamilton
    Reverse Engineer/Cyber Vulnerability Researcher
    Booz Allen Hamilton Apr 2016 - Jul 2019
    Mclean, Va, Us
    Performed independent research and analysis on conventional and embedded hardware and software systems. Reverse engineered firmware and software on target systems. Utilized VirtualBox, Qemu, and other emulators to recreate target devices and acquire a deeper understanding of targeted systems. Performed vulnerability scanning of target systems utilizing common tools such as Wireshark, Burp Suite, and Metasploit as well as Kali Linux and the Linux command line. Developed code and scripts to gain footholds in target systems and elevate privileges to exploit discovered vulnerabilities. Applied reverse engineering techniques to customer supplied hardware and software systems. Analyzed binaries and firmware with IDA Pro, Binary Ninja, Ghidra and similar tools as needed. Tested exploits and code, documented results and created and presented reports to management and team members.
  • Assured Information Security (Ais)
    Reverse Engineer/Cyber Vulnerability Analyst
    Assured Information Security (Ais) Jan 2015 - Apr 2016
    Rome, Ny, Us
    Performed independent research and analysis on embedded hardware and software systems. Built and installed embedded operating systems, including Yocto and QNX Neutrino, on target hardware to enable further understanding and characterization. Developed code and scripts to gain footholds in target systems and elevate privileges to exploit discovered vulnerabilities. Assisted senior engineers with development and design of embedded hardware to include PCB design with EAGLE design software and firmware configuration, installation and testing. Performed vulnerability scanning of target systems utilizing common tools such as Wireshark, Nexpose, and Metasploit as well as Kali Linux and the Linux command line. Analyzed binaries, software and firmware with IDA Pro, OllyDbg and similar tools as needed to gain deeper understanding of OS and hardware. Utilized RS-232, UART, serial and I2C as needed to investigate and characterize systems. Tested exploits and code, documented results and created and presented reports to management and team members.
  • Air Force Research Laboratory
    Team Lead, Uas Communications Integration
    Air Force Research Laboratory Apr 2014 - Dec 2014
    Wright-Patterson Afb, Oh, Us
    Directed team of subject matter experts testing and researching radio frequency and digital communication methods for next-generation $23M unmanned aerial systems program. Lead efforts to leverage $80M DARPA program to develop, quantify and field innovative solutions to complex comm integration problems. Designed and conducted laboratory experiments to investigate and quantify digital communications phenomenon, applied results to solve network and hardware issues. Tested embedded systems and other hardware to ascertain suitability for application in unmanned aerial systems. Analyzed embedded operating systems and associated software for required services and functionality. Monitored and characterized network traffic utilizing Wireshark, NetworkMiner and other software tools to facilitate system interoperability.
  • Nato Strategic Flight Coordination Center
    Operations Controller
    Nato Strategic Flight Coordination Center Sep 2013 - Apr 2014
    Coordinated scheduling and flight control data for more than 4K multinational flights from 28 nations in support of ISAF missions. Directed diverse, multinational team of 13 controllers in 24-hour ops to maintain continuous connectivity with customers and higher headquarters and facilitate movement of more than 70K tons of cargo.
  • United States Air Force
    Deputy Program Manager, Tube Launched Off-Board Sensors (Uav)
    United States Air Force Dec 2012 - Sep 2013
    Randolph Afb, Tx, Us
    Formulated project plans for in-house technology integration for tube launched sensors, a high-visibility, $17M program. Led multi-directorate, multi-disciplinary team of 75+ members to establish budget profiles, schedule milestones, and identify performance goals. Briefed customers and corporate leadership on updates and status of milestones.
  • Air Force Research Laboratory
    Deputy Division Chief, Energy/Power/Thermal Division
    Air Force Research Laboratory Oct 2011 - Dec 2012
    Wright-Patterson Afb, Oh, Us
    Directed daily operations of 210+ member division, oversaw research of advanced aircraft thermal management, power generation and alternative fuels development. Developed and executed division policies & procedures. Executed 30% budget cut, prioritized critical programs and saved top priority $54M program. Orchestrated $25M military construction and division relocation efforts including facility design concept, space layout planning, building demolition and personnel relocation. Participated in NSA Cyber Defense Exercise as part-time AFIT student; coordinated computer network defensive and offensive operations as part of a joint services team.
  • Defense Threat Reduction Agency
    Cbrne Analyst/Deputy Chief, Operations Branch
    Defense Threat Reduction Agency Apr 2008 - Sep 2011
    Fort Belvoir, Virginia, Us
    Synchronized modeling and simulation support to enhance the nations capability to combat Weapons of Mass Destruction (WMD) by directing efforts of a 20-man team of technical experts. Provided intelligence analysis and subject matter expertise in response to customer driven requirements. Led deployable technical support teams during international operations; providing regional hazardous chemical subject matter expertise to Combatant Commands (COCOMs) in support of contingency operations. Directed integration of counter-WMD/hazardous material models and all-source intelligence to support incident planning at local, state and national levels. Managed system administration and information assurance (IA) tasks for branch IT equipment in accordance with IAT Level II requirements. Rapid, accurate response to national leadership regarding international incidents led to team winning Director's Trophy; the top annual award for the agency.
  • United States Air Force
    Intelligence Flight Commander, 3Rd Air Support Operations Group
    United States Air Force Jul 2006 - Apr 2008
    Randolph Afb, Tx, Us
    Directed intelligence team tasked with providing multiple-source intelligence support to six squadrons, including three geographically-separated installations. Oversaw development, maintenance, and implementation of internal and external training programs. Deployed as an Intelligence Duty Officer in support of Operation Iraqi Freedom. Researched, collected and consolidated all-source intelligence products to discern patterns of complex threat behavior. Provided and briefed finished intelligence products and assessments in response to truncated delivery schedules. Preparations for unit's major inspection led to team winning the Superior Performer award.
  • Air Force Research Laboratory
    Executive Officer, Hanscom Research Site
    Air Force Research Laboratory Jan 2005 - Jul 2006
    Wright-Patterson Afb, Oh, Us
    Orchestrated daily operations of corporate-equivalent unit. Acted as prime internal and external interface for two technical directorates and 240+ personnel. Coordinated high-level tasks and actions for all site activities.
  • Air Force Research Laboratory
    Senior Opto-Electronics Scientist
    Air Force Research Laboratory Sep 2002 - Jan 2005
    Wright-Patterson Afb, Oh, Us
    Directed team in development of novel semiconductor materials for opto-electrical sensors and power devices. Investigated and quantified material properties and parameters of zinc oxide and gallium nitride compounds for use in future generation sensor networks.
  • Nasic (National Air And Space Intelligence Center)
    Intelligence Analyst; Foreign Chemical And Biological Weapon Systems
    Nasic (National Air And Space Intelligence Center) Sep 1999 - Sep 2002
    Wright-Patterson Afb, Oh, Us
    Directed, coordinated, and conducted analysis on foreign chemical and biological weapons systems, technologies and related applications. Collected and consolidated all-source intelligence products into finished intelligence assessments. Assessed and reported emerging threats to customers, enabling accurate intelligence to effectively assist national policy makers. Identified intelligence gaps to provide guidance to intelligence collection organizations. Performed independent research and analysis and reported results in response to customer-generated requirements.
  • Us Army
    Combat Medic Specialist
    Us Army Sep 1992 - Dec 1995
    Arlington, Virginia, Us
  • Us Army
    Infantry Soldier
    Us Army Jul 1989 - Aug 1992
    Arlington, Virginia, Us

Erik Grant, Cissp Skills

Fitness Training Air Force Linux Intelligence Systems Engineering Chemistry Crystal Growth Fitness Instruction Reverse Engineering Penetration Testing Computer Security Tcp/ip Protocols Uav Arcgis Backtrack Java Organic Chemistry Infantry Tactics Network Security Laboratory Skills Php C++ National Security Intelligence Analysis Military Security Clearance Software Engineering Management Project Management Malware Analysis

Erik Grant, Cissp Education Details

  • Brandeis University
    Brandeis University
    Computer Software Engineering
  • Sinclair Community College
    Sinclair Community College
    Aerial Sensing Data Analytics For Unmanned Aerial Systems
  • American Military University
    American Military University
    Digital Forensics
  • U.S. Air Force Institute Of Technology
    U.S. Air Force Institute Of Technology
    Cyber/Electronic Operations And Warfare
  • University Of Massachusetts Lowell
    University Of Massachusetts Lowell
    Computer Engineering
  • Wright State University
    Wright State University
    Materials Engineering And C++ Programming
  • Worcester State University
    Worcester State University
    Chemistry

Frequently Asked Questions about Erik Grant, Cissp

What company does Erik Grant, Cissp work for?

Erik Grant, Cissp works for Human Trafficking Service Center

What is Erik Grant, Cissp's role at the current company?

Erik Grant, Cissp's current role is Head of Operations (Volunteer).

What is Erik Grant, Cissp's email address?

Erik Grant, Cissp's email address is re****@****inc.com

What schools did Erik Grant, Cissp attend?

Erik Grant, Cissp attended Brandeis University, Sinclair Community College, American Military University, U.s. Air Force Institute Of Technology, University Of Massachusetts Lowell, Wright State University, Worcester State University.

What skills is Erik Grant, Cissp known for?

Erik Grant, Cissp has skills like Fitness Training, Air Force, Linux, Intelligence, Systems Engineering, Chemistry, Crystal Growth, Fitness Instruction, Reverse Engineering, Penetration Testing, Computer Security, Tcp/ip Protocols.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.