Eric M. Email & Phone Number
Who is Eric M.? Overview
A concise factual answer block for searchers comparing this professional profile.
Eric M. is listed as Cybersecurity Lead Analyst at Prevalon, a company with 184 employees, based in Greater Seattle Area, United States, United States. AeroLeads shows a matched LinkedIn profile for Eric M..
Eric M. previously worked as Subject Matter Expert III at Potomacwave and Lead Technologist at Booz Allen Hamilton. Eric M. holds High School Diploma from Selah High School.
Email format at Prevalon
This section adds company-level context without repeating Eric M.'s masked contact details.
Review company-level records connected to Eric M. before choosing the right outreach path.
About Eric M.
Eric M. is a Cybersecurity Lead Analyst at Prevalon.
Eric M.'s current company
Company context helps verify the profile and gives searchers a useful next step.
Eric M. work experience
A career timeline built from the work history available for this profile.
Subject Matter Expert Iii
Current
Lead Technologist
-Senior member of the Computer Incident Response Team (CSIRT). Ensuring cyber incidents are effectively detected, analyzed, mitigated, and reported in a timely manner. Ensuring that organizations accurately executes its delegated cyber preplanned responses, and meets both internal and external reporting timelines. -Battle Watch Captain during CCORI.
Lead Technologist
- Lead analyst and IC Target SME for client's high priority SIGNIT Development target mission, responsible for daily analysis, DNI mentoring, collection management, digital network characterization reconstruction and.
- Routinely briefed NSA/CSS Hawaii, USPACOM and JFHQ leadership on their high-priority OCO enabled mission as their SME for mission objectives, effects and assessment and the lead action officer for interagency.
- Performed numerous Collection Management strategy sessions to improve collection of mission data across multiple collections sources and different geo-graphical locations. Utilized multi-agency partnerships and sharing.
- Conducted advanced analysis of multiple-data sources with a strong understanding of the principles and methods of exploiting foreign communications and communication systems to collect, characterize, and identify.
- Participated in Joint Planning Groups, Operational Planning Teams, and other B2C2WGs, as well as production of intelligence products, to facilitate and support Offensive Cyber Operations (OCO).
- Organized and provided both formal and informal training sessions for DNI, newly developed tradecraft, and target knowledge transfer. Produced detailed living documents for local client and IC partners to ensure target.
Network Defense Administrator
- Provided continuing support to SOCPAC J6 leadership planning sessions for current and future DCO activity for both SOCPAC HQ and forward deployed network assets. Ensuring that both SOCPAC HQ Staff and operational units.
- Advised SOCPAC's Leadership on current and possible malicious activity so commander could make informed decisions about network risk to Special Operations Forces infrastructure.
- Provided expertise in McAfee’s ePO and subsequent modules, including Host Intrusion Prevention System (HIPS), Policy Auditor (PA), Rogue System Detection (RSD), and Virus Scan Enterprise (VSE).
- Implemented and configure software to detect and/or prevent malicious activity at host level.
- Employed HBSS, Intrusion Detection System (IDS), and network monitoring capabilities enterprise wide and field activities to correlate and analyze all-sources of counterintelligence (CI), network monitor/performance.
- Provided indecent response and reporting for intrusion detection and policy violations.
Global Network Exploitation And Vulnerability Analyst
- Analyzed and tracked intrusion set capabilities, intentions and supporting infrastructure to improve SIGINT tasking and collection.
- Monitored and assessed phishing scams, viruses, malware, hacking, and other threats. Notified Senior Watch Officers and implemented improved security measures to counter threats.
- Used packet analysis, SNORT and other Intrusion Detection Signatures to perform advanced analysis.
- Strong ability to perform static and dynamic analysis relevant to CNO and SIGINT tools and databases used for the customer mission to discover exploitation activity that was of an unknown or suspicious origin.
Cyber Intrusion Analyst
- Used knowledge of adversary activities in cyberspace with an understanding of intrusion set tactics, techniques, and procedures (TTP) to improve SIGINT tasking, collection of Foreign CNE activities, target.
- Lead DCO analyst in demanding new mission to discover exploitation activity that is of an unknown or suspicious origin. Used packet analysis, SNORT and other Intrusion Detection Signatures for multiple platforms to.
- In direct support to the NSA Technical Director, routinely participated in software development planning committees and delivered both user and customer feedback to development team for advanced DCO analytic tool.
- Provided numerous briefings to high level leadership and Flag Officers on current or emerging cyber activity as well as train junior personnel in DCO and OCO tradecraft.
- By name requested to deploy to USFK for proof-of-concept DCO/OCO exercise, CYBERPILOT. Success of exercise resulted in newly developed agency tools, training of USFK DCO analyst, numerous lessons learned, and increased.
Maritime Domain Awareness (Mda) Field System Engineer
- In close coordination with Commander, 6th Fleet and his staff. performed weekly strategy meetings to synchronize AOR-specific C4ISR assets. Conducted pre-planning for transit of various US Navy platforms throughout the.
- Provided ashore system engineering and technical support for systems supporting Command, Control, Computer, Communications, and Intelligence (C4I) for real-world operations and exercises, and Maritime Domain Awareness.
- Provided engineering feedback to the program office used to develop comprehensive maritime picture derived from multiple data sources using automated fusion tools, anomaly detection capabilities, and web scraping.
- Ensured and validated backups and data restoration processes and procedures for all managed systems.
- Implemented RETINA scanning software to ensure that patches from the Department of Defense Information Assurance Vulnerability Management (DoD IAVM) program were properly implemented.
- Provided system analysis and network engineering support for the following U.S. Government Systems: Comprehensive Maritime Awareness (CMA), Tactical Extended Maritime Intercept Operations (E-MIO) System (TES), Google.
Colleagues at Prevalon
Other employees you can reach at potomacwave.com. View company contacts for 184 employees →
Jason Dillon
Colleague at Prevalon
Killeen, Texas, United States, United States
View →
TM
Tina Martinez
Colleague at Prevalon
Alexandria, Virginia, United States, United States
View →
EM
Elizabeth Markowitz
Colleague at Prevalon
Dallas-Fort Worth Metroplex, United States
View →
AJ
Angel Johnson
Colleague at Prevalon
Washington DC-Baltimore Area, United States
View →
AB
Ashley Beckley
Colleague at Prevalon
Elizabethtown, Kentucky, United States, United States
View →
EM
Eva Mcglathery
Colleague at Prevalon
Huntsville-Decatur-Albertville Area, United States
View →
FS
Fanteye Seyoum
Colleague at Prevalon
Baltimore City County, Maryland, United States, United States
View →
ES
Erin Simmons
Colleague at Prevalon
Raleigh-Durham-Chapel Hill Area, United States
View →
VW
Venus Whren
Colleague at Prevalon
White Plains, Maryland, United States, United States
View →
KF
Kay Farrow-Smith
Colleague at Prevalon
New Alexandria, Virginia, United States, United States
View →
Eric M. education
Frequently asked questions about Eric M.
Quick answers generated from the profile data available on this page.
What company does Eric M. work for?
Eric M. works for Prevalon.
What is Eric M.'s role at Prevalon?
Eric M. is listed as Cybersecurity Lead Analyst at Prevalon.
Where is Eric M. based?
Eric M. is based in Greater Seattle Area, United States, United States while working with Prevalon.
What companies has Eric M. worked for?
Eric M. has worked for Prevalon, Potomacwave, Booz Allen Hamilton, Leonardo Drs, and National Security Agency.
Who are Eric M.'s colleagues at Prevalon?
Eric M.'s colleagues at Prevalon include Jason Dillon, Tina Martinez, Elizabeth Markowitz, Angel Johnson, and Ashley Beckley.
How can I contact Eric M.?
You can use AeroLeads to view verified contact signals for Eric M. at Prevalon, including work email, phone, and LinkedIn data when available.
What schools did Eric M. attend?
Eric M. holds High School Diploma from Selah High School.
Search by job title, company, industry, location, and seniority. Export verified B2B contact data when you need it.
Start free trialCheck these profiles if this is not the Eric M. you were looking for.
View similar profiles