Jared Wilson

Jared Wilson Email and Phone Number

Principal Security Researcher at Mandiant @ Mandiant
Jared Wilson's Location
Greater Chattanooga, United States, United States
Jared Wilson's Contact Details
About Jared Wilson

Driven cybersecurity expert with primary experience in APT network activity hunting and cyber threat intelligence analysis.http://huntsignalsandultras.com/https://twitter.com/JWilsonSecurityhttps://github.com/jaredscottwilson

Jared Wilson's Current Company Details
Mandiant

Mandiant

View
Principal Security Researcher at Mandiant
Jared Wilson Work Experience Details
  • Mandiant
    Advanced Practices Principal Security Researcher
    Mandiant Apr 2021 - Present
    Mountain View, California, Us
    - Hunt for emerging threat activity across all available telemetry: discover net-new malware families, intrusion activity, and suspicious events associated with Advanced Practices and notify our customers - Analyze technical threat data to extract TTPs, malware techniques and adversary methods with low (or no) detections, and help close those gaps within the platform - Drive detections and technology through threat expertise and knowledge - Provide threat context and integration support to multiple service lines - Provide threat research and context to global service delivery for Mandiant investigations - Perform threat research and analysis during high-severity cyber-attacks impacting customers globally
  • Permiso Security
    Advisor
    Permiso Security Jun 2022 - Jan 2023
    Palo Alto, Ca, Us
  • Gap Inc.
    Cyber Threat Hunter
    Gap Inc. Feb 2018 - Apr 2021
    San Francisco, California, Us
    - Hunt for and identify threat actor groups and their techniques, tools, and processes- Participate in Hunt missions using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors- Maintain current knowledge of tools and best-practices in advanced persistent threats; Tactics, Techniques and Procedures (TTPs) of attackers- Develop Threat Hunting dashboards and reports to identify potential threats, suspicious/anomalous activity, and malware- Identify malicious or anomalous activity based on event data from Firewalls, WAF, IPS, HIPS, Anti-Virus, and other sources- Perform deep dive analysis by correlating data from various sources- Provide expert analytic investigative support for critical Incident Response security incidents- Act as an escalation support for Incident Response SOC on critical security events
  • Lockheed Martin
    Cyber Fusion Team Lead
    Lockheed Martin Feb 2017 - Feb 2018
    Bethesda, Md, Us
    - Lead an advanced tactical team of Cyber Fusion (Hunt and Cyber Threat Intel) Analysts to success. - Trained new Cyber Fusion analysts on intelligence-driven hunt operations. - Instilled a team vision to advance our methodologies and break data-imposed barriers. - Developed numerous products including threat cards, which captured an amalgamated listing of APT TTPs in a concise and straightforward presentation
  • Lockheed Martin
    Cyber Fusion Analyst
    Lockheed Martin Sep 2015 - Feb 2017
    Bethesda, Md, Us
    - Provided threat-based analysis on current cyber threat actors and Advanced Persistent Threats (APTs) leading to threat actor attribution. - Performed hunt and anomaly-based analysis on substantial amounts of network traffic. - Developed Analysis Reports and Situational Awareness Reports on computer network exploitation intelligence and activity. - Created a full hunt, threats, fusion, and general analysis training program and taught said program on multiple occasions across the industry.
  • General Dynamics Advanced Information Systems
    Information Security Analyst
    General Dynamics Advanced Information Systems Sep 2013 - Sep 2015
    Fairfax, Va, Us
    - Identified countless malware infections and assisted in resolution. - Performed hunt-based analysis to assist in malware delivery detection. - Wrote multiple Sourcefire signatures to help detect malware delivery. - Presented at a Technical Expertise Exchange Time (TEE Time) on Cognitive Biases, their impact on analysis, and how to avoid them - Represented DISA-CONUS Net Assurance Operations as a POC on the Heartbleed exploit when it was released to the public; writing a comprehensive discussion paper on the topic. - Performed trend-analysis and on multiple occasions finding unprofiled anomalous malicious traffic leading to locating infected systems.
  • Dynamics Research Corporation
    Information Security Analyst / Fedramp Auditor
    Dynamics Research Corporation Apr 2013 - Sep 2013
    Chantilly, Virginia, Us
    - Led interviews of cloud environment operations personnel to analyze compliance with security controls. - Provided support to team-leads during auditing interviews to assess 844 security controls across four workloads. - Conducted and lead professional documentation gap analysis. - Developed the Cyber Security Practice Area Quality Manual to accurately reflect DRC assessment procedures and document compliance with ISO/IEC 17020: 2012. - Presented for the internal Cyber Security Practice Area on NIST SP 800-53 Rev. 4.
  • Liberty University
    Full Time Student
    Liberty University Aug 2008 - Dec 2012
    Lynchburg, Va, Us
    Computer science and government intelligence specialization with a math minor.
  • U.S. House Of Representatives
    Intern For Congressman Tim Walberg
    U.S. House Of Representatives May 2012 - Aug 2012
    Washington, Dc, Us
    Intern for House Representative Tim Walberg. My daily duties vary from normal office tasks to leading tours through the Capitol building to helping design webpages for the Congressman's website.
  • Wis International
    Inventory Specialist
    Wis International Jul 2010 - Aug 2011
    Plano, Texas, Us
    During the summers and winters I worked at WIS International, which is an inventory company as an inventory taker. I work with the Wizard, which is a machine that scans in the items from the store, and I take an inventory of the complete store and also their off site storage.

Jared Wilson Skills

Information Security Networking Security Public Speaking C++ System Administration Computer Security Cissp Sharepoint Microsoft Office Research Information Assurance Windows 7 Customer Service Outlook Access Penetration Testing Metasploit Security Audit Linux System Administration Virtualization Nmap Nist 800 53 Interpersonal Communication Abilities Analysis Visual Basic For Applications Access Database Cyber Security Ruby Ruby On Rails Network Security Network Traffic Analysis Intelligence U.s. Department Of Defense Leadership

Jared Wilson Education Details

  • Liberty University
    Liberty University
    Cyber Security
  • Kutztown Area High School
    Kutztown Area High School
    General Education

Frequently Asked Questions about Jared Wilson

What company does Jared Wilson work for?

Jared Wilson works for Mandiant

What is Jared Wilson's role at the current company?

Jared Wilson's current role is Principal Security Researcher at Mandiant.

What is Jared Wilson's email address?

Jared Wilson's email address is js****@****rty.edu

What schools did Jared Wilson attend?

Jared Wilson attended Liberty University, Kutztown Area High School.

What skills is Jared Wilson known for?

Jared Wilson has skills like Information Security, Networking, Security, Public Speaking, C++, System Administration, Computer Security, Cissp, Sharepoint, Microsoft Office, Research, Information Assurance.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.