Eric M.
AeroLeads people directory · profile

Eric M. Email & Phone Number

Cybersecurity Lead Analyst at Prevalon
Location: Greater Seattle Area, United States, United States 8 work roles 1 school
LinkedIn matched
3 data sources Profile completeness 86%

Contact Signals

LinkedIn Profile matched
3 free lookups remaining · No credit card
Current company
Role
Cybersecurity Lead Analyst
Location
Greater Seattle Area, United States, United States
Company size

Who is Eric M.? Overview

A concise factual answer block for searchers comparing this professional profile.

Quick answer

Eric M. is listed as Cybersecurity Lead Analyst at Prevalon, a company with 184 employees, based in Greater Seattle Area, United States, United States. AeroLeads shows a matched LinkedIn profile for Eric M..

Eric M. previously worked as Subject Matter Expert III at Potomacwave and Lead Technologist at Booz Allen Hamilton. Eric M. holds High School Diploma from Selah High School.

Company email context

Email format at Prevalon

This section adds company-level context without repeating Eric M.'s masked contact details.

Prevalon

Review company-level records connected to Eric M. before choosing the right outreach path.

Profile bio

About Eric M.

Eric M. is a Cybersecurity Lead Analyst at Prevalon.

Current workplace

Eric M.'s current company

Company context helps verify the profile and gives searchers a useful next step.

Prevalon
Prevalon
Cybersecurity Lead Analyst
Navarre, FL, US
Website
Employees
184
AeroLeads page
8 roles

Eric M. work experience

A career timeline built from the work history available for this profile.

Cybersecurity Lead Analyst

Navarre, FL, US

Subject Matter Expert Iii

Current

Washington, United States

Feb 2022 - Present

Lead Technologist

Bremerton, Washington, United States

-Senior member of the Computer Incident Response Team (CSIRT). Ensuring cyber incidents are effectively detected, analyzed, mitigated, and reported in a timely manner. Ensuring that organizations accurately executes its delegated cyber preplanned responses, and meets both internal and external reporting timelines. -Battle Watch Captain during CCORI.

Jan 2020 - Feb 2022

Lead Technologist

Hawaii, United States

  • Lead analyst and IC Target SME for client's high priority SIGNIT Development target mission, responsible for daily analysis, DNI mentoring, collection management, digital network characterization reconstruction and.
  • Routinely briefed NSA/CSS Hawaii, USPACOM and JFHQ leadership on their high-priority OCO enabled mission as their SME for mission objectives, effects and assessment and the lead action officer for interagency.
  • Performed numerous Collection Management strategy sessions to improve collection of mission data across multiple collections sources and different geo-graphical locations. Utilized multi-agency partnerships and sharing.
  • Conducted advanced analysis of multiple-data sources with a strong understanding of the principles and methods of exploiting foreign communications and communication systems to collect, characterize, and identify.
  • Participated in Joint Planning Groups, Operational Planning Teams, and other B2C2WGs, as well as production of intelligence products, to facilitate and support Offensive Cyber Operations (OCO).
  • Organized and provided both formal and informal training sessions for DNI, newly developed tradecraft, and target knowledge transfer. Produced detailed living documents for local client and IC partners to ensure target.
Apr 2013 - Dec 2019

Network Defense Administrator

Hawaii, United States

  • Provided continuing support to SOCPAC J6 leadership planning sessions for current and future DCO activity for both SOCPAC HQ and forward deployed network assets. Ensuring that both SOCPAC HQ Staff and operational units.
  • Advised SOCPAC's Leadership on current and possible malicious activity so commander could make informed decisions about network risk to Special Operations Forces infrastructure.
  • Provided expertise in McAfee’s ePO and subsequent modules, including Host Intrusion Prevention System (HIPS), Policy Auditor (PA), Rogue System Detection (RSD), and Virus Scan Enterprise (VSE).
  • Implemented and configure software to detect and/or prevent malicious activity at host level.
  • Employed HBSS, Intrusion Detection System (IDS), and network monitoring capabilities enterprise wide and field activities to correlate and analyze all-sources of counterintelligence (CI), network monitor/performance.
  • Provided indecent response and reporting for intrusion detection and policy violations.
Apr 2012 - Apr 2013

Global Network Exploitation And Vulnerability Analyst

Hawaii, United States

  • Analyzed and tracked intrusion set capabilities, intentions and supporting infrastructure to improve SIGINT tasking and collection.
  • Monitored and assessed phishing scams, viruses, malware, hacking, and other threats. Notified Senior Watch Officers and implemented improved security measures to counter threats.
  • Used packet analysis, SNORT and other Intrusion Detection Signatures to perform advanced analysis.
  • Strong ability to perform static and dynamic analysis relevant to CNO and SIGINT tools and databases used for the customer mission to discover exploitation activity that was of an unknown or suspicious origin.
Nov 2011 - Apr 2012

Cyber Intrusion Analyst

Hawaii, United States

  • Used knowledge of adversary activities in cyberspace with an understanding of intrusion set tactics, techniques, and procedures (TTP) to improve SIGINT tasking, collection of Foreign CNE activities, target.
  • Lead DCO analyst in demanding new mission to discover exploitation activity that is of an unknown or suspicious origin. Used packet analysis, SNORT and other Intrusion Detection Signatures for multiple platforms to.
  • In direct support to the NSA Technical Director, routinely participated in software development planning committees and delivered both user and customer feedback to development team for advanced DCO analytic tool.
  • Provided numerous briefings to high level leadership and Flag Officers on current or emerging cyber activity as well as train junior personnel in DCO and OCO tradecraft.
  • By name requested to deploy to USFK for proof-of-concept DCO/OCO exercise, CYBERPILOT. Success of exercise resulted in newly developed agency tools, training of USFK DCO analyst, numerous lessons learned, and increased.
Nov 2010 - Nov 2011

Maritime Domain Awareness (Mda) Field System Engineer

Naples, Campania, Italy

  • In close coordination with Commander, 6th Fleet and his staff. performed weekly strategy meetings to synchronize AOR-specific C4ISR assets. Conducted pre-planning for transit of various US Navy platforms throughout the.
  • Provided ashore system engineering and technical support for systems supporting Command, Control, Computer, Communications, and Intelligence (C4I) for real-world operations and exercises, and Maritime Domain Awareness.
  • Provided engineering feedback to the program office used to develop comprehensive maritime picture derived from multiple data sources using automated fusion tools, anomaly detection capabilities, and web scraping.
  • Ensured and validated backups and data restoration processes and procedures for all managed systems.
  • Implemented RETINA scanning software to ensure that patches from the Department of Defense Information Assurance Vulnerability Management (DoD IAVM) program were properly implemented.
  • Provided system analysis and network engineering support for the following U.S. Government Systems: Comprehensive Maritime Awareness (CMA), Tactical Extended Maritime Intercept Operations (E-MIO) System (TES), Google.
Feb 2009 - Oct 2010
Team & coworkers

Colleagues at Prevalon

Other employees you can reach at potomacwave.com. View company contacts for 184 employees →

1 education record

Eric M. education

FAQ

Frequently asked questions about Eric M.

Quick answers generated from the profile data available on this page.

What company does Eric M. work for?

Eric M. works for Prevalon.

What is Eric M.'s role at Prevalon?

Eric M. is listed as Cybersecurity Lead Analyst at Prevalon.

Where is Eric M. based?

Eric M. is based in Greater Seattle Area, United States, United States while working with Prevalon.

What companies has Eric M. worked for?

Eric M. has worked for Prevalon, Potomacwave, Booz Allen Hamilton, Leonardo Drs, and National Security Agency.

Who are Eric M.'s colleagues at Prevalon?

Eric M.'s colleagues at Prevalon include Jason Dillon, Tina Martinez, Elizabeth Markowitz, Angel Johnson, and Ashley Beckley.

How can I contact Eric M.?

You can use AeroLeads to view verified contact signals for Eric M. at Prevalon, including work email, phone, and LinkedIn data when available.

What schools did Eric M. attend?

Eric M. holds High School Diploma from Selah High School.

Find 750M verified contacts

Search by job title, company, industry, location, and seniority. Export verified B2B contact data when you need it.

People with similar names

Check these profiles if this is not the Eric M. you were looking for.

View similar profiles