Jessie Cooper

Jessie Cooper Email and Phone Number

Security Researcher @ Kforce Inc | Vulnerability Research, Vulnerability Assessment, CISSP @ Kforce Inc
Tampa, Fl
Jessie Cooper's Location
Idaho Falls, Idaho, United States, United States
Jessie Cooper's Contact Details

Jessie Cooper work email

Jessie Cooper personal email

n/a
About Jessie Cooper

As a Security Vulnerability Researcher at Kforce Inc, I apply my extensive knowledge and experience in cybersecurity, network security, and computer forensics to identify and mitigate vulnerabilities in applications before they are deployed. I have over six years of experience in conducting vulnerability research, network analysis, and protocol analysis on various systems and platforms, including 5G and radio frequency networks.I hold a Master of Business Administration degree with a focus on cyber and computer forensics, as well as several industry-recognized certifications, such as CISSP, SSCP, and Security+. I am passionate about finding and solving complex security challenges and contributing to the protection and enhancement of critical infrastructure and national security. I am also proficient in several programming languages, such as C++, Python, and Bash, and I use them to create automation scripts, quality control, and database management.

Jessie Cooper's Current Company Details
Kforce Inc

Kforce Inc

View
Security Researcher @ Kforce Inc | Vulnerability Research, Vulnerability Assessment, CISSP
Tampa, Fl
Website:
kforce.com
Employees:
1
Jessie Cooper Work Experience Details
  • Kforce Inc
    Security Vulnerability Researcher
    Kforce Inc Oct 2022 - Present
    Tampa, Fl, Us
    In this role, I perform short-term vulnerability assessments on applications before it is deployed on HP systems. These assessments include the following.•Decompile applications using Ghidra and ILSpy to look for vulnerabilities in the code base.•Perform network analysis using Burp Suite on desktop and web applications.•Discover Windows application vulnerabilities using tools such as Sysinternals suite and OWASP Dependency-Check.•Create evidence-based reports identifying vulnerabilities in applications and recommendations on how to remediate these vulnerabilities.•Use tools such as Process Hacker 2 and Power Shell to create proof of concept attacks in companion with reports to exploit vulnerabilities in Windows applications.
  • Utah Army National Guard
    Signal Officer
    Utah Army National Guard Dec 2016 - Present
    Draper, Ut, Us
    • Platoon leader for a signal support platoon specializing in retransmission of radio signals and high‐frequency radio transmission. • Operated in a team that acted as cyber security consultants to Utah utility companies. • Worked on the Utah incident response team as a member of the Utah Defensive Cyber Operations Element. • Managed a signal support staff section for a battalion size element. • Developed the Standard Operating Procedure for computer forensics incident response. • Managed the radio communications network at the Utah National Guard’s 2018 Best Warrior Competition.
  • Idaho National Laboratory
    Wireless Security Researcher
    Idaho National Laboratory Jul 2020 - Oct 2022
    Idaho Falls, Id, Us
    • Created a functioning 5G network using a combination of open-source and commercial systems. • Used a combination of network and protocol analysis along with open-source research to discover vulnerabilities in the 5G architecture. • Conducted quality control and implementation of C++ code. • Created a database of frequency data to use for the classification and categorization of radio frequencies. • Analyzed radio frequency data for the identification of anomalous signals. • Created automation scripts using python and bash for the implementation of new systems.
  • National Information Assurance Training And Education Center
    Information Assurance Analyst
    National Information Assurance Training And Education Center Aug 2018 - May 2020
    Pocatello, Id, Us
    • Instructed peers on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and Cybersecurity Framework (CSF) and associated legislation. • Worked on a team to develop the 2018 and 2019 NIATEC Invitational Collegiate Cyber Defense Competition. • Developed automated red team scripts, created virtualized environments, and troubleshot OpenStack infrastructure. • Instructed team members in networking basics, TCP/IP and OSI model fundamentals, home network analysis, and network security deployment. • Managed the NIATEC’s 2018 National Cyber Security Awareness Month effort by organizing and delegating team responsibilities, developing cybersecurity awareness training slides, and instructing campus classes and community groups. • Published a social engineering security article in the Idaho State Journal.
  • U.S. Department Of Homeland Security
    Cyber Security Analyst
    U.S. Department Of Homeland Security May 2019 - Aug 2019
    Washington, Dc, Us
    • Developed a white paper on hydroelectric dams and the ICS cybersecurity vendor Claroty to be archived for future DHS efforts.• Developed a cyber-attack scenario on a gas pipeline utilizing the MITRE ATT&CK framework.• Received hands-on training in network forensics, memory forensics, PowerShell, and Splunk.• Engaged in simulated incident response and used Splunk to determine malicious users and network traffic, mapped the intrusion pathfrom initial breach to the final target, and isolated malicious files for further examination.• Participated in a Capture the Flag exercise that tested expertise in identifying malicious files, encryption, and malicious network traffic.
  • Idaho Army National Guard
    Information Technology Specialist
    Idaho Army National Guard Jun 2012 - Dec 2016
    Idaho
    - Trained and proficient in A+, Security+, CCNA, and software implementation. - Responsibilities included but not limited to, working on military networks, troubleshooting and repairing devices, and performing maintenance on Army systems. - Maintained a secret level security clearance through the duration of my service.
  • Idaho State University
    Tutor
    Idaho State University Aug 2015 - Apr 2016
    Id, Us
    I was responsible for tutoring Advanced Business Statistics. I coordinated with over 15 different students schedules to provide weekly group tutoring sessions. I taught theories of regression, forecasting, and statistical process control.

Jessie Cooper Skills

Microsoft Office Teamwork Microsoft Word Team Leadership Information Technology Troubleshooting Security Team Building Microsoft Excel Leadership Public Speaking Windows Comptia A+ Project Management Java C# Computer Hardware Customer Service Military Computer Repair Computer Security Comptia Security+ Minitab Jmp Network Security Management Event Planning Army Training Networking Microsoft Powerpoint Python Computer Forensics

Jessie Cooper Education Details

  • Idaho State University
    Idaho State University
    Cyber/Computer Forensics And Counterterrorism
  • Idaho State University
    Idaho State University
    Computer Science
  • College Of Southern Idaho
    College Of Southern Idaho
    Psychology

Frequently Asked Questions about Jessie Cooper

What company does Jessie Cooper work for?

Jessie Cooper works for Kforce Inc

What is Jessie Cooper's role at the current company?

Jessie Cooper's current role is Security Researcher @ Kforce Inc | Vulnerability Research, Vulnerability Assessment, CISSP.

What is Jessie Cooper's email address?

Jessie Cooper's email address is je****@****inl.gov

What schools did Jessie Cooper attend?

Jessie Cooper attended Idaho State University, Idaho State University, College Of Southern Idaho.

What skills is Jessie Cooper known for?

Jessie Cooper has skills like Microsoft Office, Teamwork, Microsoft Word, Team Leadership, Information Technology, Troubleshooting, Security, Team Building, Microsoft Excel, Leadership, Public Speaking, Windows.

Who are Jessie Cooper's colleagues?

Jessie Cooper's colleagues are Enrico Krüger, Juan Guadarrama, Leiana Leavy, Pmp, Pmi-Acp, Psm I, Mazzaro Ctr, Dan Henes, Mahmoud E., Chandana Bondu.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.