Erik Grant, Cissp Email and Phone Number
Erik Grant, Cissp work email
- Valid
Erik Grant, Cissp personal email
Currently employed Red Team operator. Retired military officer and meticulous professional with over 20 years combined experience in Information Technology and Intelligence Analysis. Ability to investigate and solve complex technical problems quickly with a proven ability to excel in and master diverse fields. Experienced with exploitation and dissemination of all-source intelligence products. Ability to work independently or as part of a team. Strong technical background and problem-solving skills. Excellent verbal and written communication skills. Top performance awards in intelligence and technical analysis. Current Top Secret clearance in an SCI billet with a CI Poly. Core competencies include:Red Team operations - Computer forensics - Software Reverse Engineering – Open Source Intelligence (OSINT) – Vulnerability Testing – Exploit Development – Intelligence Analysis
Human Trafficking Service Center
View- Website:
- htscinc.com
- Employees:
- 1
-
Head Of Operations (Volunteer)Human Trafficking Service CenterHuntsville, Al, Us -
Red Team Security Engineer/Reverse EngineerMillennium Corporation Feb 2024 - PresentArlington, Va, UsEmulates adversary cyber tactics, techniques, and procedures (TTPs) to ascertain security posture of DoD networks and weapon systems. Deploys remotely or locally as part of an NSA certified Red Team. Maintains proficiency in Red Team operations by on-site training and mentoring and individual research. Conducts vulnerability and exploit research as directed by senior team members. Tests target networks and systems via common tools such as Cobalt Strike, nmap, Mimikatz and Kali Linux. -
Senior Cyber Security/Forensics EngineerMillennium Corporation Jun 2021 - Jan 2024Arlington, Va, UsPerformed computer and network forensics on systems to ascertain detectability and survivability of binaries. Inspected compromised systems/networks using Autopsy, FTK Imager, and other native tools. Served as the subject-matter expert on proprietary, highly specialized software. Analyzed target software utilizing Ghidra, Wireshark, binwalk, and additional classified tools to ascertain suitability for designed purpose. Configured, tested, and deployed Docker containers and virtual machines as required. Wrote and tested YARA rules to help verify binary suitability for targeted implementation. Supported Red Team missions as required, performing reverse engineering of binaries and other tasks as needed. Acted as the primary coordinator between geographically separate teams to synchronize efforts in response to operational demands. Briefed stakeholders and corporate leadership on program status and vectored efforts to meet project milestones. Authored reports and presentations providing corporate leadership and other stakeholders with program details and progress. -
Head Of Operations (Volunteer)Human Trafficking Service Center Jul 2022 - PresentNew Castle, Pa, UsLeads a three person team conducting HTSC’s Operations and outreach. Plans and conducts Open Source Intelligence (OSINT) surface web and darknet research in support of HTSC’s Alabama and Pennsylvania teams. Develops intelligence products, including reports and briefings, for use in awareness campaigns and internal training. Coordinates with HTSC senior staff weekly in order to share operational and administrative data and plan for future events. Performs reconnaissance on suspected trafficking locations and other facilities. Develops training plans and onboarding procedures for new members. Manages social media and chat platforms (Discord), updates channels with pertinent information, and moderates discussions and responses. Performs outreach with local law enforcement, other anti-trafficking organizations, and women’s shelters. Develops and conducts in-person and remote (Zoom) training sessions on anti-trafficking areas to include cyber, surface and deep/dark web research. -
Principal, Cyber TriageRaytheon Intelligence & Space Aug 2019 - May 2021Arlington, Va, UsLead a team of subject-matter experts focused on reverse-engineering foreign air, space and cyberspace-related military systems at the National Air and Space Intelligence Center's (NASIC) Foreign Material Exploitation (FME) facility. Coordinated with stakeholders to identify desired outcomes of exploitation, identified research areas, and vectored team efforts to discover potential vulnerabilities. Forensically acquired target system firmware and software using commonly available toolsets such as FTK and X-Ways Forensics. Analyzed target binaries using Ghidra, IDA Pro and other additional common tools. Assisted in developing and testing Ghidra modules and scripts for use with new architectures and chipsets. Monitored team progress against project milestones and adjusted manning and focus as needed -
Reverse Engineer/Cyber Vulnerability ResearcherBooz Allen Hamilton Apr 2016 - Jul 2019Mclean, Va, UsPerformed independent research and analysis on conventional and embedded hardware and software systems. Reverse engineered firmware and software on target systems. Utilized VirtualBox, Qemu, and other emulators to recreate target devices and acquire a deeper understanding of targeted systems. Performed vulnerability scanning of target systems utilizing common tools such as Wireshark, Burp Suite, and Metasploit as well as Kali Linux and the Linux command line. Developed code and scripts to gain footholds in target systems and elevate privileges to exploit discovered vulnerabilities. Applied reverse engineering techniques to customer supplied hardware and software systems. Analyzed binaries and firmware with IDA Pro, Binary Ninja, Ghidra and similar tools as needed. Tested exploits and code, documented results and created and presented reports to management and team members. -
Reverse Engineer/Cyber Vulnerability AnalystAssured Information Security (Ais) Jan 2015 - Apr 2016Rome, Ny, UsPerformed independent research and analysis on embedded hardware and software systems. Built and installed embedded operating systems, including Yocto and QNX Neutrino, on target hardware to enable further understanding and characterization. Developed code and scripts to gain footholds in target systems and elevate privileges to exploit discovered vulnerabilities. Assisted senior engineers with development and design of embedded hardware to include PCB design with EAGLE design software and firmware configuration, installation and testing. Performed vulnerability scanning of target systems utilizing common tools such as Wireshark, Nexpose, and Metasploit as well as Kali Linux and the Linux command line. Analyzed binaries, software and firmware with IDA Pro, OllyDbg and similar tools as needed to gain deeper understanding of OS and hardware. Utilized RS-232, UART, serial and I2C as needed to investigate and characterize systems. Tested exploits and code, documented results and created and presented reports to management and team members. -
Team Lead, Uas Communications IntegrationAir Force Research Laboratory Apr 2014 - Dec 2014Wright-Patterson Afb, Oh, UsDirected team of subject matter experts testing and researching radio frequency and digital communication methods for next-generation $23M unmanned aerial systems program. Lead efforts to leverage $80M DARPA program to develop, quantify and field innovative solutions to complex comm integration problems. Designed and conducted laboratory experiments to investigate and quantify digital communications phenomenon, applied results to solve network and hardware issues. Tested embedded systems and other hardware to ascertain suitability for application in unmanned aerial systems. Analyzed embedded operating systems and associated software for required services and functionality. Monitored and characterized network traffic utilizing Wireshark, NetworkMiner and other software tools to facilitate system interoperability. -
Operations ControllerNato Strategic Flight Coordination Center Sep 2013 - Apr 2014Coordinated scheduling and flight control data for more than 4K multinational flights from 28 nations in support of ISAF missions. Directed diverse, multinational team of 13 controllers in 24-hour ops to maintain continuous connectivity with customers and higher headquarters and facilitate movement of more than 70K tons of cargo.
-
Deputy Program Manager, Tube Launched Off-Board Sensors (Uav)United States Air Force Dec 2012 - Sep 2013Randolph Afb, Tx, UsFormulated project plans for in-house technology integration for tube launched sensors, a high-visibility, $17M program. Led multi-directorate, multi-disciplinary team of 75+ members to establish budget profiles, schedule milestones, and identify performance goals. Briefed customers and corporate leadership on updates and status of milestones. -
Deputy Division Chief, Energy/Power/Thermal DivisionAir Force Research Laboratory Oct 2011 - Dec 2012Wright-Patterson Afb, Oh, UsDirected daily operations of 210+ member division, oversaw research of advanced aircraft thermal management, power generation and alternative fuels development. Developed and executed division policies & procedures. Executed 30% budget cut, prioritized critical programs and saved top priority $54M program. Orchestrated $25M military construction and division relocation efforts including facility design concept, space layout planning, building demolition and personnel relocation. Participated in NSA Cyber Defense Exercise as part-time AFIT student; coordinated computer network defensive and offensive operations as part of a joint services team. -
Cbrne Analyst/Deputy Chief, Operations BranchDefense Threat Reduction Agency Apr 2008 - Sep 2011Fort Belvoir, Virginia, UsSynchronized modeling and simulation support to enhance the nations capability to combat Weapons of Mass Destruction (WMD) by directing efforts of a 20-man team of technical experts. Provided intelligence analysis and subject matter expertise in response to customer driven requirements. Led deployable technical support teams during international operations; providing regional hazardous chemical subject matter expertise to Combatant Commands (COCOMs) in support of contingency operations. Directed integration of counter-WMD/hazardous material models and all-source intelligence to support incident planning at local, state and national levels. Managed system administration and information assurance (IA) tasks for branch IT equipment in accordance with IAT Level II requirements. Rapid, accurate response to national leadership regarding international incidents led to team winning Director's Trophy; the top annual award for the agency. -
Intelligence Flight Commander, 3Rd Air Support Operations GroupUnited States Air Force Jul 2006 - Apr 2008Randolph Afb, Tx, UsDirected intelligence team tasked with providing multiple-source intelligence support to six squadrons, including three geographically-separated installations. Oversaw development, maintenance, and implementation of internal and external training programs. Deployed as an Intelligence Duty Officer in support of Operation Iraqi Freedom. Researched, collected and consolidated all-source intelligence products to discern patterns of complex threat behavior. Provided and briefed finished intelligence products and assessments in response to truncated delivery schedules. Preparations for unit's major inspection led to team winning the Superior Performer award. -
Executive Officer, Hanscom Research SiteAir Force Research Laboratory Jan 2005 - Jul 2006Wright-Patterson Afb, Oh, UsOrchestrated daily operations of corporate-equivalent unit. Acted as prime internal and external interface for two technical directorates and 240+ personnel. Coordinated high-level tasks and actions for all site activities. -
Senior Opto-Electronics ScientistAir Force Research Laboratory Sep 2002 - Jan 2005Wright-Patterson Afb, Oh, UsDirected team in development of novel semiconductor materials for opto-electrical sensors and power devices. Investigated and quantified material properties and parameters of zinc oxide and gallium nitride compounds for use in future generation sensor networks. -
Intelligence Analyst; Foreign Chemical And Biological Weapon SystemsNasic (National Air And Space Intelligence Center) Sep 1999 - Sep 2002Wright-Patterson Afb, Oh, UsDirected, coordinated, and conducted analysis on foreign chemical and biological weapons systems, technologies and related applications. Collected and consolidated all-source intelligence products into finished intelligence assessments. Assessed and reported emerging threats to customers, enabling accurate intelligence to effectively assist national policy makers. Identified intelligence gaps to provide guidance to intelligence collection organizations. Performed independent research and analysis and reported results in response to customer-generated requirements. -
Combat Medic SpecialistUs Army Sep 1992 - Dec 1995Arlington, Virginia, Us -
Infantry SoldierUs Army Jul 1989 - Aug 1992Arlington, Virginia, Us
Erik Grant, Cissp Skills
Erik Grant, Cissp Education Details
-
Brandeis UniversityComputer Software Engineering -
Sinclair Community CollegeAerial Sensing Data Analytics For Unmanned Aerial Systems -
American Military UniversityDigital Forensics -
U.S. Air Force Institute Of TechnologyCyber/Electronic Operations And Warfare -
University Of Massachusetts LowellComputer Engineering -
Wright State UniversityMaterials Engineering And C++ Programming -
Worcester State UniversityChemistry
Frequently Asked Questions about Erik Grant, Cissp
What company does Erik Grant, Cissp work for?
Erik Grant, Cissp works for Human Trafficking Service Center
What is Erik Grant, Cissp's role at the current company?
Erik Grant, Cissp's current role is Head of Operations (Volunteer).
What is Erik Grant, Cissp's email address?
Erik Grant, Cissp's email address is re****@****inc.com
What schools did Erik Grant, Cissp attend?
Erik Grant, Cissp attended Brandeis University, Sinclair Community College, American Military University, U.s. Air Force Institute Of Technology, University Of Massachusetts Lowell, Wright State University, Worcester State University.
What skills is Erik Grant, Cissp known for?
Erik Grant, Cissp has skills like Fitness Training, Air Force, Linux, Intelligence, Systems Engineering, Chemistry, Crystal Growth, Fitness Instruction, Reverse Engineering, Penetration Testing, Computer Security, Tcp/ip Protocols.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial