Heath U.

Heath U. Email and Phone Number

Cyber Threat @ South Carolina, United States
South Carolina, United States
Heath U.'s Location
Greenville-Spartanburg-Anderson, South Carolina Area, United States, United States
Heath U.'s Contact Details

Heath U. work email

Heath U. personal email

n/a
About Heath U.

Heath Upton is an Cyber Security Consultant located in Greenville, SC, who specializes in offensive operations, threat emulation. and intelligence operations. As a soldier in the US Army, Heath led numerous Sensitive Reconnaissance, Electronic Warfare, and Offensive Cyber Operations. As a cyber professional Heath engaged the DoD where he performed and automated malware and forensic analysis on new capabilities, tested new tools for operational readiness, and evaluated incoming cyber operators for suitability. Additionally, he tracked various nation-state hacking groups, subsequently analyzing and reporting on their capabilities, actions, and likely outcomes. Later, Heath joined USCYBERCOM where he orchestrated cyber OPFOR and OCO integration between cyber range partners, US Five Eyes partners, and US National Mission Force commanders for Cyber Flag joint combined exercises. Previously, Heath joined the DHS mission to help safeguard critical infrastructure by penetration testing various election systems, state and county governments, and the NFL in preparation for Super Bowl LIII. Heath maintains numerous certifications and is a certified intrusion analyst, forensic analyst, malware analyst, and incident handler. In his free time, he can often be found updating his testing lab, automating things, and most recently developing realistic targets for CTF scenarios.

Heath U.'s Current Company Details
Independent

Independent

Cyber Threat
South Carolina, United States
Heath U. Work Experience Details
  • Independent
    Independent
    South Carolina, United States
  • <Redacted>
    Cyber Threat
    Oct 2020 - Present
    Planned, executed, and briefed offensive cyber operations including phishing exercises, vulnerability assessments, penetration tests and sophisticated threat emulation for commercial and government clients. Developed and refined documentation to enable more consistent and streamlined engagements. Developed incident response procedures and led a ransomware response team from attacker negotiations to recovery status.
  • Independent
    Cyber Security Consultant
    Independent Apr 2018 - Present
    Engaged in sophisticated network operations against US critical infrastructure including US election systems, venues of mass gathering, and various governmental departments and agencies to determine and advise on weak points within their respective external and internal security implementations. Tested and evaluated a large-scale incident response platform centered on threat intelligence and communications.
  • Stage 2 Security
    Infosec Researcher
    Stage 2 Security Dec 2018 - Oct 2020
    Developed a comprehensive, multi-staged Purple Team/Cyber Exercise program that focused on leveraging current attacker TTPs to more fully engage the Incident Response chain which produced a more trained and focused team of network defenders. Additionally, led full-spectrum red team operations and developed business offerings such as red team as a service, and continuous attack surface monitoring to further promote early threat detection.
  • Accenture
    Cyber Threat
    Accenture Apr 2016 - Apr 2018
    Dublin 2, Ie
    Engaged in persistent and sustained Red Team operations against client office networks and worldwide datacenters. To better enable these operations, developed new attack techniques and custom tooling to accommodate the diverse and dynamic target sets. Additionally, tested IoT products to discover zero-day or undiscovered vulnerabilities before product release.
  • Assured Information Security (Ais)
    Cyber Threat Intelligence Analyst
    Assured Information Security (Ais) Dec 2014 - Apr 2016
    Rome, Ny, Us
    Researched nation-state threat actors and corresponding government affiliations to determine desired outcomes against US national interests. This was paired with conducting technical and strategic analysis on collected data to derive facts, inferences and projections regarding cyber actor capabilities, intentions, and likelihood of attack, to produce detailed reports on unique threats and threat profiles, to national leadership. Supported strategic cyber operations with partner agencies by providing tactical intelligence that enabled numerous successful cyber operations.
  • Keyw
    Senior Engineer/Cyber Threat Emulation
    Keyw Oct 2010 - Dec 2014
    Hanover, Md, Us
    Planned and executed “Red Team/OPFOR” exercises to engage multi-joint forces response capability to various cyber attack scenarios.Researched, developed, and created cyber attack techniques and strategies for DoD Cyber ExercisesAnalyzed malware such as RATs and BOTs to discover techniques that would be useful for threat emulationDeveloped and taught original course material on cyber attack methodologies and supported hands on learning objectives for KEYW's Offensive Methodology and Analysis. Installed, configured, managed, and automated a comprehensive virtual training network designed to allow for the testing of complex vulnerability assessment style operations.Automated the installation of a complex product used by law enforcement agencies worldwide. This program eliminated the need of having a technician at each site for installation.
  • Mantech International Corporation
    Computer Network Operations Engineer
    Mantech International Corporation Nov 2008 - Oct 2010
    Herndon, Virginia, Us
    Performed forensic analysis and using open source forensic tools and reverse malwaretechniques on multiple platforms to detect malicious activityDeveloped scenarios and expanded suite of regression tests to include previously undefinedmethods for testing tool functionality in new operating environmentsBuilt an environment for testing various scenarios on various hardware platforms which resultedin significantly reduced times for both multiple and individual testsAdministered projects for code integration and test automation
  • Windermere/Keyw
    Lab Manager/Engineer
    Windermere/Keyw Oct 2005 - Nov 2008
    Hanover, Md, Us
    Led a remote installation team that installed and configured an end-to-end training networkconsisting of ESX servers, Cisco routers and switches, storage arrays, and computerworkstationsCreated course curriculum and practical exercises designed to to test students ability to recognize and react to a compromised network.Tested custom and open source tools against the virtual hardened network
  • Csc
    Professional Security Advisor
    Csc Apr 2004 - Oct 2005
    Global, Us
    Provided specialized Information System Security support integral to the Client's missionthrough analysis activities, incident response, and Information System Security Office servicesResponsible for security assurance of customer networks and information systems as a member of the NSA/CSS Information Systems Incident Response Team (NISIRT)Routinely used custom and open source tools to monitor the customer network andprovide feedback and reporting on malicious activity and fraud waste and abuse cases
  • U.S. Army
    Analyst/Operator
    U.S. Army Jan 1998 - Aug 2005
    Arlington, Virginia, Us
    Conducted Operations meant to deny, disrupt, or degrade enemy communications in support of DoD operations.Analyzed computers and networks for vulnerabilities to determine weaknesses in them and subsequently exploit them for access during penetration testing in a "Red Team" environment.Conducted vulnerability/external penetration testing and intrusion detection monitoring to prevent future penetrations of U.S. military systems.Worked numerous Sensitive Reconnaissance operations (SRO) missions as a SIGINT analyst and was instrumental in resolving mission manning problems that enabled the Advanced Quick look (AQL) Electronic Intelligence mission to effectively provide direct intelligence support.Provided near real time Signals Intelligence Analysis necessary for support of several field readiness exercises.

Heath U. Skills

Computer Security Information Assurance Malware Analysis Vulnerability Assessment Security Dod Vulnerability Scanning Incident Response Intelligence Analysis Networking Network Forensics Python Linux Network Security Windows Metasploit Vulnerability Management Defense Forensic Analysis Nist Diacap Giac Military Computer Network Defense C++ Computer Network Attack Signals Intelligence Security Incident Response Gcih Grem Gcfa Gsec Krav Maga Ninja Skills Information Security Penetration Testing Powershell U.s. Department Of Defense

Frequently Asked Questions about Heath U.

What company does Heath U. work for?

Heath U. works for Independent

What is Heath U.'s role at the current company?

Heath U.'s current role is Cyber Threat.

What is Heath U.'s email address?

Heath U.'s email address is he****@****labs.io

What are some of Heath U.'s interests?

Heath U. has interest in Politics, Education, Science And Technology, Animal Welfare, Health.

What skills is Heath U. known for?

Heath U. has skills like Computer Security, Information Assurance, Malware Analysis, Vulnerability Assessment, Security, Dod, Vulnerability Scanning, Incident Response, Intelligence Analysis, Networking, Network Forensics, Python.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.