Jordan Holt Email and Phone Number
As a Cyber Treat Analyst, Malware Reverse Engineer and a former Computer Network Defense Analyst at the National Security Agency, I apply my certified cybersecurity skills (PMP, CISSP, GCIH, GDSA, SecurityX, CySA+, PenTest+, GSTRT, CSIE, CSAE, CNSP, CNVP, CSAP, CSCP, Cloud+, SSAP, GSEC, , SEC+) and my military background to safeguard critical information and systems from cyber threats. I have developed a unique blend of technical and analytical abilities that enable me to reverse-engineer complex malware samples, identify network vulnerabilities, and prevent intrusions.I have a proven track record of delivering high-quality analytical reports, conducting in-depth intelligence analysis, and designing and implementing signature-based detection and prevention methodologies. I also have a profound understanding of network protocols and advanced malware techniques, such as self-defending and anti-analysis mechanisms. I am passionate about continuous learning and knowledge sharing, and I seek opportunities to leverage my diverse skills to tackle complex cybersecurity challenges and contribute to a forward-thinking team.
Alȳn, Inc.
View- Website:
- alyninc.com
- Employees:
- 9
-
Cyber Threat AnalystAlȳn, Inc. Oct 2023 - Present- Reviewed and analyzed security data within the SIEM and network traffic such as full packet captures and/or Netflow data in order to detect traffic anomalies, identify infected systems and threat actor related activity based on known tactics, techniques, and procedures.- Monitored various security blogs, alerts and notifications, RSS feeds and forums in order to keep abreast of the latest security news, attacks, threats, vulnerabilities and exploits.- Created content feeds to detect malicious traffic based on known or detected indicators of compromise.- Created automated log correlations in Splunk, ELK, or a similar tool to identify anomalous and potentially malicious behavior.- Acted in concert with Cyber Threat Intelligence to understand threats and to determine what risk these threats present to the client. Incorporated CTI findings into threat hunting activities and workflow.- Contributed to incident response teams, maintaining relevant communication in emails, ticket summaries, analysis and reporting. Worked with Incident Handlers to provide recommendations for remediation of compromised systems and any relevant counter-measures.- Contributed to the development of advanced threat actor profiles unique to clients and based upon analysis of acquired malware samples and incident artifacts.- Reviewed, created or documented standard operating procedures, recommendations, project specific documents and resource guides as needed. -
Malware Reverse EngineerNational Security Agency Jul 2020 - Dec 2023- Authored analytical reports in support of Nationally tasked missions and detailed reports based on technical review for senior leadership.- Analyzed and reverse-engineered complex malware samples using dynamic and static analysis techniques. Tools included IDA Pro, Ghidra, x64dbg, x32dbg, PEStudio, InetSim, the SysInternals Suite, Kali, REMnux, Volatility, and others.- Utilized forensics tools such as FTK and Autopsy to identify and investigate compromised devices.- Designed and implemented signature-based intrusion detection and prevention methodologies to detect malicious activity with tools such as Yara and others.- Demonstrated understanding of advanced malware techniques such as self-defending malware, polymorphic malware, rootkits, exploit kits, ransomware, and memory-resident malware.- Participated in meetings and provided ad hoc briefings with internal and external customers, other government agencies, and Foreign SIGINT partners to advise, support, and collaborate with NSA representatives.***(Case Number: RES-2023-04843)*** -
Computer Network Defense AnalystNational Security Agency Jul 2020 - Dec 2023- Performed advanced analysis of collection and OSINT data to discover high-value targets, maintain target continuity, and profile target techniques, tactics, and procedures.- Conducted intelligence analysis using a variety of Intelligence Community tools and databases in support of gathering data from targets and adversary networks.- Conducted real-time analysis of incoming network traffic to identify potential threats. Regularly used tools such as Snort, Wireshark, and Kibana.- In depth knowledge of TCP/IP, HTTP/HTTPS, DNS, FTP, and other network protocols.- Created an OSINT Threat Discovery process to proactively search for emerging threats.***(Case Number: RES-2023-04843)*** -
Cyber Warfare TechnicianUs Navy Apr 2017 - Dec 2023· Spearheaded network analysis and cybersecurity operations, ensuring theprotection of sensitive information and communications integrity.· Led a team of eight military members, contractors, and civilians in detectingand neutralizing cyber threats.· Conducted in-depth analysis of network traffic, identifying vulnerabilitiesand recommending critical system improvements, resulting in enhancednetwork resilience.· Collaborated with cross-functional teams to develop and implementinnovative cybersecurity strategies, safeguarding Navy computer networks andDoD Systems from potential cyber-attacks.· Successfully managed and maintained secure communications systems tosupport critical national security objectives.· Trained and mentored junior Sailors, providing comprehensive knowledgetransfer and fostering a culture of continuous learning and development.
Jordan Holt Education Details
-
Cybersecurity Engineering -
Strategic Intelligence -
International Studies And Political Science -
Joint Cyber Analysis Course -
Naval School Explosive Ordnance DisposalExplosive Ordinance/Bomb Disposal -
Naval Diving And Salvage Training CenterDiving Operations -
Tennessee Law Enforcement Training AcademyLaw Enforcement -
Center For Explosive Ordnance Disposal And Diving (Ceneoddive)
Frequently Asked Questions about Jordan Holt
What company does Jordan Holt work for?
Jordan Holt works for Alȳn, Inc.
What is Jordan Holt's role at the current company?
Jordan Holt's current role is Cyber Threat Analyst & Threat Hunter | Malware Reverse Engineer | CISSP, PMP, SSAP, GIAC x 4 & CompTIA x 11.
What schools did Jordan Holt attend?
Jordan Holt attended Sans Technology Institute, National Intelligence University, Rhodes College, United States Naval Academy, Joint Cyber Analysis Course, Naval School Explosive Ordnance Disposal, Naval Diving And Salvage Training Center, Tennessee Law Enforcement Training Academy, Center For Explosive Ordnance Disposal And Diving (Ceneoddive).
Who are Jordan Holt's colleagues?
Jordan Holt's colleagues are Colton Judkins, Malakai Bailey, Penny Eckert, Brittany Dubus.
Not the Jordan Holt you were looking for?
-
Jordan Holt
Network Systems Administrator @ Stanly Community College | Part-Time It Instructor | Vmware, Aws, A+, Net+, And Sec+ CertifiedAlbemarle, Nc -
Jordan Holt
Kansas City Metropolitan Area2twilio.com, vertafore.com -
1parachutemedia.co
-
Jordan Holt
Dallas-Fort Worth Metroplex3scoutclinical.com, cooperindiana.com, sunocolp.com
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial