J K Email and Phone Number
Experienced security and intelligence analyst with a demonstrated history of building analytics operations from scratch that develop new insights, set cutting edge standards, and deliver actionable results supporting both internal and external customer needs.
-
Senior Cyber Threat Intelligence Analyst, VpPrivate Company Oct 2021 - PresentLondon, Gb -
Cyber Threat Intelligence AnalystGeneral Motors Jan 2016 - Sep 2021Detroit, Michigan, Us- Created full-spectrum OSINT methodology playbook library for requirements-driven intelligence products and insights.- Staffed multi-national intelligence efforts and incidents to cover interests in North America, Europe, Asia, Eastern Europe, SouthAmerica, Africa, and Russia.- Built an intelligence requirements-driven external all-source intelligence monitoring methodology and toolset.- Stood up cyber and competitive intelligence requirements capability, including input, refinement, tracking, and management.- Established non-attributable technology and procedure solution for dark web intelligence monitoring.- Mapped full MITRE ATT&CK TTPs across Cyber Defense Matrix NIST CSF domains- Modeled 60,000+ intelligence-driven threats against company products in a co-authored, repeatable, patent-pending FAIR-based threat modeling framework against MITRE ATT&CK TTPs- Created monthly staff training material for latest cyber threats that could impact specific business functions.- Maintained leadership roles in industry ISAC, championing inter-OEM information and threat sharing.- Removed intra-company siloes to better coordinate and contextualize OSINT reporting, and assess potential enterprise impact.- Crafted and documented intelligence product templates, standards, lifecycle, and feedback mechanisms. -
Data Scientist, Data Protection And Threat AnalysisJpmorgan Chase & Co. Jan 2015 - Jan 2016New York, Ny, Us- Chartered and led the platform development of insider threat big data environment, metric reporting, and data-fusion center.- Advised threat intelligence, governance, and non-traditional / OSINT programs on vendors, data sourcing, collection, and analysis.- Algorithmically identified trends in data leaving the firm via e-mail, contributing to an overall insider threat program.- Planned a priorities roadmap for identification of signals and reduction of noise in data loss prevention (DLP) procedures.- Drove data mining efforts, reporting plans, and dashboarding and visualization for key firm and line of business metrics.- Trained staff in statistical software, platforms, and algorithms for cybersecurity, intelligence gathering, and threat identification.- Represented insider threat investigations to firm operating committee reporting process. - Crafted new rules and policies for detecting insider threat and compromised systems using data and algorithm-driven approaches. -
Extrapolatory Intelligence AnalystAdvanced Digital Intelligance Group Aug 2013 - Jan 2015- Exploited, merged, and extrapolated non-traditional intelligence sources to assess client risks and opportunities.- All source intelligence analyst charged with identifying all publicly available information on any subject in any sector.- Mined social media, unindexed databases, and deep-web resources for trending data and bespoke analyses on behalf of clients ranging from Federal governments and intelligence agencies, to agricultural retailers and consumer packaged goods giants.- Identified and harvested deep web information, intelligence, and extrapolated insights.- Extrapolated consumer insights based on non-traditional qualitative and quantitative data including demographic breakdowns, previously unknown missing markets, and quantifiably actionable insights on consumer sentiment.
-
All-Source And Web Intelligence AnalystUs Federal Government May 2012 - Aug 2013- Presented on all-source and web-intelligence analysis, social media market analysis, and trend-analysis to government and industry analyst roundtable.- Employed qualitative and quantitative analytical methodologies to identify likely points of interest.- Assumed staff responsibilities for investigation, targeting, and coordination when staff were not available.- Staffed and supported operations including communications logistics, data collection, log tracking, and data dissemination.- Served as inter-team liaison regarding covered subject matter and intelligence issues.- Implemented innovative GIS and social network visualization techniques of intelligence data.- Provided intelligence analysis, geospatial processing, and logistical support to US Government intelligence program.- Profiled attributable information of topics of interest operating in the NY AOR.- Drilled down patterned information to illustrate operational characteristics of items of interest.- Built and collaborated in personality assessments and targeting packages of candidates.- Streamlined client’s use of collected information by efficiently automating data management and false positive identification via quantitative means. - Applied big-data analytics techniques in order to attribute relevant information of individuals in operational situations. -
Sr. Consultant Ii, Pci Qsa And CehProtiviti Dec 2010 - May 2012Menlo Park, California, Us- Conducted web-application pen-testing, application vulnerability scanning, and network optimization for over 20 Fortune 100 and 500 clients, leveraging commercial and open-source software suites, network planning, and public-source research.- Performed network discovery and analysis tasks, including pen-testing, hardening, and recon for commercial clients.- Provided guidance to Fortune 100/500 customers regarding Information Security implementation and software strategy plans based on industry-standard models (OWASP, CIS) and compliance frameworks (PCI DSS, ISO 27001). - Performed program reviews to identify gaps in network operation, and develop enterprise-wide deployment planning strategies. -
Associate, Gis Analyst, Osint Analyst, And CehBooz | Allen | Hamilton May 2006 - Nov 2010Mclean, Va, Us- Oversaw all-source intel analysis, Computer Network Defense (CND), and Threat and Vulnerability Analysis (TVA) projects for the full life-cycle, while tracking and managing a nearly $1M budget.- Served in a leadership position in pioneering team use of up to date performance engineering and optimization methodologies and analysis techniques, including 3D, CAD, and GIS visualization capabilities.- Played a key role in over 40 in-depth intel and infrastructure analyses of networks, technologies, environments, and organizations.- Received formal training in intel tools and capabilities. - Trained internal parties in intel analysis, open/all-source/GEOINT investigation, vulnerability ID, and cyber pen-testing.- Monitored daily threat reporting to assess level of risk and predict potential effects to critical infrastructure and defense community.- In support of the homeland security community, assessed network performance, availability, resiliency and security to attribute man-made and natural events, to include OS-fingerprinting, threat-sourcing, IP mapping, and virus/malware/spyware effects.- Briefed and advised Federal, state, and local decision-makers on CND analyses in classified and unclassified spaces.- Implemented network analysis capabilities utilizing available public data sources (e.g., BGP, Renesys, LookingGlass, etc.) and deconflicted, correlated, and reported on related classified data, resulting in a robust analytical capability.- Designed and participated in various exercises to test security and emergency response capabilities, and model impact analysis.
J K Education Details
-
James Madison UniversityGeographic Information Science And Cartography
Frequently Asked Questions about J K
What company does J K work for?
J K works for Private Company
What is J K's role at the current company?
J K's current role is Cyber Threat Intelligence, Leadership, and Emerging Threats.
What schools did J K attend?
J K attended James Madison University.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial