Heath U. work email
- Valid
Heath U. personal email
Heath Upton is an Cyber Security Consultant located in Greenville, SC, who specializes in offensive operations, threat emulation. and intelligence operations. As a soldier in the US Army, Heath led numerous Sensitive Reconnaissance, Electronic Warfare, and Offensive Cyber Operations. As a cyber professional Heath engaged the DoD where he performed and automated malware and forensic analysis on new capabilities, tested new tools for operational readiness, and evaluated incoming cyber operators for suitability. Additionally, he tracked various nation-state hacking groups, subsequently analyzing and reporting on their capabilities, actions, and likely outcomes. Later, Heath joined USCYBERCOM where he orchestrated cyber OPFOR and OCO integration between cyber range partners, US Five Eyes partners, and US National Mission Force commanders for Cyber Flag joint combined exercises. Previously, Heath joined the DHS mission to help safeguard critical infrastructure by penetration testing various election systems, state and county governments, and the NFL in preparation for Super Bowl LIII. Heath maintains numerous certifications and is a certified intrusion analyst, forensic analyst, malware analyst, and incident handler. In his free time, he can often be found updating his testing lab, automating things, and most recently developing realistic targets for CTF scenarios.
Independent
-
IndependentSouth Carolina, United States
-
Cyber Threat
Oct 2020 - PresentPlanned, executed, and briefed offensive cyber operations including phishing exercises, vulnerability assessments, penetration tests and sophisticated threat emulation for commercial and government clients. Developed and refined documentation to enable more consistent and streamlined engagements. Developed incident response procedures and led a ransomware response team from attacker negotiations to recovery status. -
Cyber Security ConsultantIndependent Apr 2018 - PresentEngaged in sophisticated network operations against US critical infrastructure including US election systems, venues of mass gathering, and various governmental departments and agencies to determine and advise on weak points within their respective external and internal security implementations. Tested and evaluated a large-scale incident response platform centered on threat intelligence and communications.
-
Infosec ResearcherStage 2 Security Dec 2018 - Oct 2020Developed a comprehensive, multi-staged Purple Team/Cyber Exercise program that focused on leveraging current attacker TTPs to more fully engage the Incident Response chain which produced a more trained and focused team of network defenders. Additionally, led full-spectrum red team operations and developed business offerings such as red team as a service, and continuous attack surface monitoring to further promote early threat detection.
-
Cyber ThreatAccenture Apr 2016 - Apr 2018Dublin 2, IeEngaged in persistent and sustained Red Team operations against client office networks and worldwide datacenters. To better enable these operations, developed new attack techniques and custom tooling to accommodate the diverse and dynamic target sets. Additionally, tested IoT products to discover zero-day or undiscovered vulnerabilities before product release. -
Cyber Threat Intelligence AnalystAssured Information Security (Ais) Dec 2014 - Apr 2016Rome, Ny, UsResearched nation-state threat actors and corresponding government affiliations to determine desired outcomes against US national interests. This was paired with conducting technical and strategic analysis on collected data to derive facts, inferences and projections regarding cyber actor capabilities, intentions, and likelihood of attack, to produce detailed reports on unique threats and threat profiles, to national leadership. Supported strategic cyber operations with partner agencies by providing tactical intelligence that enabled numerous successful cyber operations. -
Senior Engineer/Cyber Threat EmulationKeyw Oct 2010 - Dec 2014Hanover, Md, UsPlanned and executed “Red Team/OPFOR” exercises to engage multi-joint forces response capability to various cyber attack scenarios.Researched, developed, and created cyber attack techniques and strategies for DoD Cyber ExercisesAnalyzed malware such as RATs and BOTs to discover techniques that would be useful for threat emulationDeveloped and taught original course material on cyber attack methodologies and supported hands on learning objectives for KEYW's Offensive Methodology and Analysis. Installed, configured, managed, and automated a comprehensive virtual training network designed to allow for the testing of complex vulnerability assessment style operations.Automated the installation of a complex product used by law enforcement agencies worldwide. This program eliminated the need of having a technician at each site for installation. -
Computer Network Operations EngineerMantech International Corporation Nov 2008 - Oct 2010Herndon, Virginia, UsPerformed forensic analysis and using open source forensic tools and reverse malwaretechniques on multiple platforms to detect malicious activityDeveloped scenarios and expanded suite of regression tests to include previously undefinedmethods for testing tool functionality in new operating environmentsBuilt an environment for testing various scenarios on various hardware platforms which resultedin significantly reduced times for both multiple and individual testsAdministered projects for code integration and test automation -
Lab Manager/EngineerWindermere/Keyw Oct 2005 - Nov 2008Hanover, Md, UsLed a remote installation team that installed and configured an end-to-end training networkconsisting of ESX servers, Cisco routers and switches, storage arrays, and computerworkstationsCreated course curriculum and practical exercises designed to to test students ability to recognize and react to a compromised network.Tested custom and open source tools against the virtual hardened network -
Professional Security AdvisorCsc Apr 2004 - Oct 2005Global, UsProvided specialized Information System Security support integral to the Client's missionthrough analysis activities, incident response, and Information System Security Office servicesResponsible for security assurance of customer networks and information systems as a member of the NSA/CSS Information Systems Incident Response Team (NISIRT)Routinely used custom and open source tools to monitor the customer network andprovide feedback and reporting on malicious activity and fraud waste and abuse cases -
Analyst/OperatorU.S. Army Jan 1998 - Aug 2005Arlington, Virginia, UsConducted Operations meant to deny, disrupt, or degrade enemy communications in support of DoD operations.Analyzed computers and networks for vulnerabilities to determine weaknesses in them and subsequently exploit them for access during penetration testing in a "Red Team" environment.Conducted vulnerability/external penetration testing and intrusion detection monitoring to prevent future penetrations of U.S. military systems.Worked numerous Sensitive Reconnaissance operations (SRO) missions as a SIGINT analyst and was instrumental in resolving mission manning problems that enabled the Advanced Quick look (AQL) Electronic Intelligence mission to effectively provide direct intelligence support.Provided near real time Signals Intelligence Analysis necessary for support of several field readiness exercises.
Heath U. Skills
Frequently Asked Questions about Heath U.
What company does Heath U. work for?
Heath U. works for Independent
What is Heath U.'s role at the current company?
Heath U.'s current role is Cyber Threat.
What is Heath U.'s email address?
Heath U.'s email address is he****@****labs.io
What are some of Heath U.'s interests?
Heath U. has interest in Politics, Education, Science And Technology, Animal Welfare, Health.
What skills is Heath U. known for?
Heath U. has skills like Computer Security, Information Assurance, Malware Analysis, Vulnerability Assessment, Security, Dod, Vulnerability Scanning, Incident Response, Intelligence Analysis, Networking, Network Forensics, Python.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial