Jordan Holt

Jordan Holt Email and Phone Number

Cyber Threat Analyst & Threat Hunter | Malware Reverse Engineer | CISSP, PMP, SSAP, GIAC x 4 & CompTIA x 11 @ Alȳn, Inc.
Jordan Holt's Location
United States, United States
About Jordan Holt

As a Cyber Treat Analyst, Malware Reverse Engineer and a former Computer Network Defense Analyst at the National Security Agency, I apply my certified cybersecurity skills (PMP, CISSP, GCIH, GDSA, SecurityX, CySA+, PenTest+, GSTRT, CSIE, CSAE, CNSP, CNVP, CSAP, CSCP, Cloud+, SSAP, GSEC, , SEC+) and my military background to safeguard critical information and systems from cyber threats. I have developed a unique blend of technical and analytical abilities that enable me to reverse-engineer complex malware samples, identify network vulnerabilities, and prevent intrusions.I have a proven track record of delivering high-quality analytical reports, conducting in-depth intelligence analysis, and designing and implementing signature-based detection and prevention methodologies. I also have a profound understanding of network protocols and advanced malware techniques, such as self-defending and anti-analysis mechanisms. I am passionate about continuous learning and knowledge sharing, and I seek opportunities to leverage my diverse skills to tackle complex cybersecurity challenges and contribute to a forward-thinking team.

Jordan Holt's Current Company Details
Alȳn, Inc.

Alȳn, Inc.

View
Cyber Threat Analyst & Threat Hunter | Malware Reverse Engineer | CISSP, PMP, SSAP, GIAC x 4 & CompTIA x 11
Website:
alyninc.com
Employees:
9
Jordan Holt Work Experience Details
  • Alȳn, Inc.
    Cyber Threat Analyst
    Alȳn, Inc. Oct 2023 - Present
    - Reviewed and analyzed security data within the SIEM and network traffic such as full packet captures and/or Netflow data in order to detect traffic anomalies, identify infected systems and threat actor related activity based on known tactics, techniques, and procedures.- Monitored various security blogs, alerts and notifications, RSS feeds and forums in order to keep abreast of the latest security news, attacks, threats, vulnerabilities and exploits.- Created content feeds to detect malicious traffic based on known or detected indicators of compromise.- Created automated log correlations in Splunk, ELK, or a similar tool to identify anomalous and potentially malicious behavior.- Acted in concert with Cyber Threat Intelligence to understand threats and to determine what risk these threats present to the client. Incorporated CTI findings into threat hunting activities and workflow.- Contributed to incident response teams, maintaining relevant communication in emails, ticket summaries, analysis and reporting. Worked with Incident Handlers to provide recommendations for remediation of compromised systems and any relevant counter-measures.- Contributed to the development of advanced threat actor profiles unique to clients and based upon analysis of acquired malware samples and incident artifacts.- Reviewed, created or documented standard operating procedures, recommendations, project specific documents and resource guides as needed.
  • National Security Agency
    Malware Reverse Engineer
    National Security Agency Jul 2020 - Dec 2023
    - Authored analytical reports in support of Nationally tasked missions and detailed reports based on technical review for senior leadership.- Analyzed and reverse-engineered complex malware samples using dynamic and static analysis techniques. Tools included IDA Pro, Ghidra, x64dbg, x32dbg, PEStudio, InetSim, the SysInternals Suite, Kali, REMnux, Volatility, and others.- Utilized forensics tools such as FTK and Autopsy to identify and investigate compromised devices.- Designed and implemented signature-based intrusion detection and prevention methodologies to detect malicious activity with tools such as Yara and others.- Demonstrated understanding of advanced malware techniques such as self-defending malware, polymorphic malware, rootkits, exploit kits, ransomware, and memory-resident malware.- Participated in meetings and provided ad hoc briefings with internal and external customers, other government agencies, and Foreign SIGINT partners to advise, support, and collaborate with NSA representatives.***(Case Number: RES-2023-04843)***
  • National Security Agency
    Computer Network Defense Analyst
    National Security Agency Jul 2020 - Dec 2023
    - Performed advanced analysis of collection and OSINT data to discover high-value targets, maintain target continuity, and profile target techniques, tactics, and procedures.- Conducted intelligence analysis using a variety of Intelligence Community tools and databases in support of gathering data from targets and adversary networks.- Conducted real-time analysis of incoming network traffic to identify potential threats. Regularly used tools such as Snort, Wireshark, and Kibana.- In depth knowledge of TCP/IP, HTTP/HTTPS, DNS, FTP, and other network protocols.- Created an OSINT Threat Discovery process to proactively search for emerging threats.***(Case Number: RES-2023-04843)***
  • Us Navy
    Cyber Warfare Technician
    Us Navy Apr 2017 - Dec 2023
    · Spearheaded network analysis and cybersecurity operations, ensuring theprotection of sensitive information and communications integrity.· Led a team of eight military members, contractors, and civilians in detectingand neutralizing cyber threats.· Conducted in-depth analysis of network traffic, identifying vulnerabilitiesand recommending critical system improvements, resulting in enhancednetwork resilience.· Collaborated with cross-functional teams to develop and implementinnovative cybersecurity strategies, safeguarding Navy computer networks andDoD Systems from potential cyber-attacks.· Successfully managed and maintained secure communications systems tosupport critical national security objectives.· Trained and mentored junior Sailors, providing comprehensive knowledgetransfer and fostering a culture of continuous learning and development.

Jordan Holt Education Details

Frequently Asked Questions about Jordan Holt

What company does Jordan Holt work for?

Jordan Holt works for Alȳn, Inc.

What is Jordan Holt's role at the current company?

Jordan Holt's current role is Cyber Threat Analyst & Threat Hunter | Malware Reverse Engineer | CISSP, PMP, SSAP, GIAC x 4 & CompTIA x 11.

What schools did Jordan Holt attend?

Jordan Holt attended Sans Technology Institute, National Intelligence University, Rhodes College, United States Naval Academy, Joint Cyber Analysis Course, Naval School Explosive Ordnance Disposal, Naval Diving And Salvage Training Center, Tennessee Law Enforcement Training Academy, Center For Explosive Ordnance Disposal And Diving (Ceneoddive).

Who are Jordan Holt's colleagues?

Jordan Holt's colleagues are Colton Judkins, Malakai Bailey, Penny Eckert, Brittany Dubus.

Not the Jordan Holt you were looking for?

  • Jordan Holt

    Network Systems Administrator @ Stanly Community College | Part-Time It Instructor | Vmware, Aws, A+, Net+, And Sec+ Certified
    Albemarle, Nc
  • Jordan Holt

    Kansas City Metropolitan Area
    2
    twilio.com, vertafore.com
  • Jordan Holt

    Account Manager At Pierce Public Relations
    Nashville, Tn
    1
    parachutemedia.co
  • Jordan Holt

    Dallas-Fort Worth Metroplex
    3
    scoutclinical.com, cooperindiana.com, sunocolp.com

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.