John Stoner Email and Phone Number
John Stoner personal email
- Valid
- Valid
Mr. John Stoner, a US Army veteran, and a CISSP and PMP certified professional, brings over 25 years of experience in the US Intelligence Community (USIC), DOD, and SLED with over 15 focused in cybersecurity. He is a cybersecurity specialist who excels in an impactful, dynamic role, ideally across verticals, or serving multiple clients. He has experience with Cyber Threat Intelligence (CTI), instructional design, cyber counterintelligence (CI), Defense Industrial Base (DIB) engagements, NIST 800-171 & 800-53 frameworks, Advanced Persistent Threat (APT) analysis, Risk Management Framework (RMF) and Governance, Risk and Compliance (GRC). His broad cybersecurity knowledge is helpful for risk-based, full-lifecycle approaches to cybersecurity. He is experienced in presenting technical analysis in written products and presentations, including conferences, and online webinars. John is also passionate about helping others in INFOSEC and volunteers in the INFOSEC community and volunteers at multiple cybersecurity events.Views & postings = personal view and not that of my employer or any government agency
Mandiant (Part Of Google Cloud)
View- Website:
- google.com
- Employees:
- 1
- Company phone:
- 916.253.7820
-
Senior Cybersecurity ConsultantMandiant (Part Of Google Cloud)Washington, Dc, Us -
Senior Security ConsultantGoogle Oct 2023 - PresentMountain View, Ca, Us- Demonstrates mastery in cybersecurity consulting, providing expert guidance across specific cybersecurity domains.- Conducts a variety cybersecurity assessment for federal, DoD, SLED and commercial clients with an eye on assisting organizations in identifying areas for improvement and providing roadmaps to improve critical operations.- Develops and instructs an assortment of cybersecurity focused courses, leveraging years of Instructional design expertise and both in classroom and virtual course experience.- Facilitates cybersecurity table top exercises (TTXs) for a wide variety of federal, DoD, SLED and commercial clients.- Selected to represent Google at BlackHat as an instructor for “OSINT Tools and Techniques” -
Cybersecurity Conference Talks And VolunteeringFreelance Mar 2017 - Present- Runs the Harrisburg BSide Career Village since 2024.- Served as The Diana Initiative (TDI) Career Village Lead for 3 years and on the Safety staff as part of the all volunteer conference personnel.- Since 2021 runs an annual 4-hour virtual Resume workshop with VetSec as part of the yearly online VetSecCon. Works with veterans in the VetSec Slack on their resume and with mentorship volunteering.- Volunteers as a DEFCON G00N since 2023.- Volunteers at multiple cybersecurity conferences including The Diana Initiative (TDI) 2020-2024, DEFCON 28 Career Hacking Village, multiple BSides conferences, VetSecCon, Pancakes CON 2 and others.- Presents at various cybersecurity conferences over the years. -
Deputy Program Manager & Threat AnalystBooz Allen Hamilton Mar 2021 - Sep 2023Mclean, Va, Us- Deputy Program manager and Lead Cyber Threat Analyst for a 35 person Cyber Threat Intelligence team supporting DHS- Led the cybersecurity efforts for a prototype delivery of 5G AR/VR/XR for a DoD client, including leading the System Security Plan (SSP), and contributing to the System Engineering Management Plan (SEMP), and the System Design Document (SDD)- Assisted in a part time capacity with a USACE client as an ISSO on two software applications- Provided cybersecurity insights into wearable device project for DoD clients- Assisted with multiple proposals as a cybersecurity SME- Performed Risk Management Framework (RMF) and Governance, Risk and Compliance (GRC) activities- Wrote a white paper on the future of US Army installations, SMART buildings and environmentally friendly reimagining of basing -
Cyber Threat Intelligence AnalystCaci International Inc Aug 2020 - Mar 2021Reston, Virginia, Us- Conducted cyber threat intelligence analysis of Advanced Persistent Threats (APTs) for the Analytical Group (AG) at DC3.- Wrote Intelligence Information Reports (IIRs) on cybersecurity issues, malware, and APT related subjects.- Authored Cyber Intelligence Reports (CIRs) on various cybersecurity topics (long-form narrative reports).- Identified patterns, trends, and events in threat actor Tactics, Techniques, and Procedures (TTPs)- Presented briefing on nation-state specific APTs during first virtual AG Quarterly Conference in November 2020- Used various analytic processes and tools, including TestFlight, VirusTotal, DomainTools, Malpedia, Pulse, M3, HOTR, HighPoint, the cyber kill chain, Malpedia, the diamond model, Bianco’s pyramid of pain and MITRE ATT&CK -
Dcise Deputy Director (Gs-14)United States Department Of Defense Aug 2019 - Aug 2020Washington, Dc, Us- As Deputy Director, supervised a mission directorate with 60 civilians, LNOs and contractors- Oversaw daily mission operations, including cyber threat analysis for more than 750 Cleared Defense Contractors- Through the budgeting and POM process was able to acquire additional 6 CTR FTE for DCISE in FY21- Presented at a number of public and classified venues on cybersecurity and cyber threat intelligence topics- Graduated from the 80-hour in residence OSI Leadership Challenge Forum (LCF) course - Routinely represented DC3/DCISE at internal and external DOD/USIC and executive meetings -
Chief Of Analytics, Dcise (Gs-14)United States Department Of Defense Nov 2017 - Aug 2019Washington, Dc, Us- As the Chief of Analytics, supervised a diverse team of 34 civilian, LNO and contractor analysts- Briefed the Cyber Panel for FY21 and the Enterprise IT (EIT) Council at the pentagon regarding funding - Led a civilian offsite and proactively worked towards future team-building events and offsites Acting Chief of Analytics, DCISE (GS-13):NOV 2017 – DEC 2018- Spearheaded Analytic Division re-organization upon assuming role of acting Chief of Analytics- Wrote the Analytics Division Concept of Operations (CONOPs) from scratch as part of the re-org- Streamlined the entire Analytic Division’s Job Qualifications Requirements (JQR) plan- Analyzed cyber threat actors and APTs using Pulse, M3, HOTR, DomainTools, VirusTotal, and DC3 databases -
Cybersecurity AnalystBooz Allen Hamilton Aug 2017 - Nov 2017Mclean, Va, Us- Spearheaded development of a 24-module PenTester Training Guide; utilized SME input across the firm- Conducted Penetration Tests of various products, including web applications and cross domain solutions- Used VSphere as an administrator to support cyber-range exercise environments; familiar with Vsphere admin functionality, creation of VMs, physical-to-virtual configuration; ISO to VM- Proctored cyber training event for 50 US Air Force staff on immersive proprietary cyber-range platform -
Cyber Counterintelligence AnalystBooz Allen Hamilton May 2016 - Sep 2017Mclean, Va, Us- Conducted analysis in support of counterintelligence actions, operations, and investigations for 902nd MI Group- Authored 81-page classified booklet titled “Cyber Counterintelligence Best Practices Guide”- Routinely conducted analysis on various foreign cyber threat actors and Advanced Persistent Threats (APTs) - Used various tools to conduct analysis including Pulse, M3, HOTR, DomainTools, VirusTotal, and others -
Lead TechnologistBooz Allen Hamilton Oct 2015 - May 2016Mclean, Va, Us- Works on a variety of cyber projects for the CSN (Cyber Solutions Network) team- Conducts Penetration Testing/Security Testing on various technologies- Involved in the roll out of a Virtual Cyber Exercise Range- Involved in a tool called CyberSIM for individual or team based hacking challenges- Leading effort to create cohesive modular Penetration Testing training plan- Maintains the Booz Allen 'Cyber & Technology' Yammer Group -
Cybersecurity TrainerBerico Technologies Nov 2013 - Sep 2015- Certified Ethical Hacker, CompTIA A+, Net+, Sec+ and CISSP Instructor for 780th MI BDE, US Army- Developed customized instructional material for A+ / Net+ / Sec+ / CEH / CISSP classes- Created 12 labs for IT classes, including XSS & SQL Labs using Webgoat, NMAP/ZENMAP, IP Scanning, Steganography, MAC Spoofing, Metasploit, and intro to Wireshark
-
Lead Cybersecurity InstructorBooz Allen Hamilton Aug 2010 - Nov 2013Mclean, Va, Us- Lead instructor for the Cyber Foundations and cybersecurity courses for 780th MI BDE, US Army- Developed and instructed lessons on cyber threats, cyber kill chain, intelligence processes, social networking analysis (SNA), Google hacking, Open Source Intelligence (OSINT), electronic warfare (EW), and other cyber topics - Developed the Booz Allen "Intro to Cyber" course with Learning and Design (L&D) specialists- Participated in my first Capture the Flag (CTF) at an in-person event hosted by Booz Allen- Served on an integrated cross-market team as an OSINT and cyber analyst for several months for commercial client- Completed the Booz Allen Hamilton 5-week Cyber Bootcamp -
Senior AnalystOberon Division, Stanley Inc. Apr 2010 - Aug 2010- Conducted research and performed analysis related to DISA T&E methodology and proposed changes
-
Senior Sigint AnalystUs Army Aug 2007 - Jun 2010Arlington, Virginia, Us- I was instrumental in the leadership of the organization overseeing the Canadian support for tactical and strategic operations for deployed elements. -
Sigint AnalystUs Army Mar 2000 - Aug 2007Arlington, Virginia, Us- As the Non-commissioned officer (NCO) in charge of a mission operational team and a platoon sergeant, I was responsible for over 30 soldiers, including daily management of mission operations, technical training, numerous military training exercises, the care of my soldiers and a physical fitness program while stationed at Fort Meade, MD- Spearheaded collaboration with international intelligence partners at Fort Meade, MD- Served as a SIGINT Analyst stationed in Germany at initial duty station supporting multiple overseas operations
John Stoner Skills
John Stoner Education Details
-
University Of Maryland Global CampusComputer Studies -
College Of Southern MarylandCommunication -
Booz Allen HamiltonIt -
American Military University (Online)Counter-Terrorism -
United States Air Force, Goodfellow Air Force BaseSignals Intelligence (Sigint) And Electronic Warfare (Ew)
Frequently Asked Questions about John Stoner
What company does John Stoner work for?
John Stoner works for Mandiant (Part Of Google Cloud)
What is John Stoner's role at the current company?
John Stoner's current role is Senior Cybersecurity Consultant.
What is John Stoner's email address?
John Stoner's email address is jo****@****ail.com
What schools did John Stoner attend?
John Stoner attended University Of Maryland Global Campus, College Of Southern Maryland, Booz Allen Hamilton, American Military University (Online), United States Air Force, Goodfellow Air Force Base.
What skills is John Stoner known for?
John Stoner has skills like Development And Delivery Of Training, Air Force, Oberon, Sec, Catalogue, Windows Server, Ceh, Top Secret, Steganography, Audacity, Cli, Trains And Add Rails.
Who are John Stoner's colleagues?
John Stoner's colleagues are Kyer Dal, Nanda Sanjaya, Pavel Bryzgalov, Bhavesh Kumar Prajapat, Nayaz Pasha, Monu Prabhakar, Rick Hironimus.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial