Kyle O. Email and Phone Number
Kyle O. work email
- Valid
Kyle O. personal email
Highly proficient All-Source Intelligence Analyst with 17 years of experience and holds a current DoD Top Secret Security Clearance with SCI access and CI Polygraph. Demonstrates strong leadership and managerial skills, strong communication skills, exceptional understanding of technology and innovation. Demonstrates proficiency in the fusion of HUMINT, GEOINT, SIGINT, OSINT, MASINT and Imagery. Experience involves management of collection, analysis, evaluation, interpretation, and dissemination of information on topics that geopolitical risk, terrorism, activism, crime, cyber issues, and insider threat. Previous work included being responsible for both tracking and analyzing emerging threats domestically and internationally and contextualizing threats specific to the US Military assets. Has deployed experience in Support of Operation Iraqi Freedom and Operation Enduring Freedom.I am currently working on expanding my Microsoft Software & Systems Academy for Server and Cloud Administration knowledge while pursing the Microsoft Certified Solutions Associate (MCSA) certification. I am developing my skills as an I.T. professional and look forward to future employment.
-
Cyber Threat AnalystCyint Government Services LlcBaltimore, Md, Us
-
Cyber Counterintelligence Analyst / Investigations & Operations SupportUs Army Aug 2023 - PresentArlington, Virginia, UsCyber: Identify, investigate, and pursue significant cyber events and communicate findings to critical United States Army Counterintelligence Command (USACIC) decision-makers via a broad range of intelligence products while adhering to intelligence tradecraft and methods. Research and analyze trends and technical developments in Cybercrime, Hacktivism, Advanced Persistent Threat (APT) actors, intent, capability, tactics, techniques, and procedures (TTPs) development. Conducted research on emerging cyber threats, methods, processes, cyber warfare techniques, and offensive capabilities. Identify preeminent, occurring, or planned targeted intrusions against the enterprise by leveraging private and public cyber intelligence sources, utilizing existing security tool sets, and advanced analysis methodologies. Conduct web-based research on "open" sources and the Darknet, Deep Web, Event and threat correlation, Trend Analysis, Proactive adversary infrastructure identification and tracking, Strategic security focused consulting and analysis. Conduct an analysis of the mobility report to identify application vulnerabilities on government-furnished devices. Work in collaboration with support elements to test and evaluate solutions to assist in meeting objectives.Investigation and Operations: Provides direct support to USACIC Europe to aide in ongoing investigations and operations. Liaison between USACIC Directorate of Intelligence (DI) and the National Counterintelligence Task Force as an active Task Force Member (TFM). Participates in planning, development, and execution of complex Cl operations involving information and technology against both traditional intelligence and asymmetric threats. -
Cyber Threat AnalystCyint Government Services Llc May 2022 - Jul 2023Responsible for assisting the client in the collection of intelligence using open source, social media, human, technical intelligence from the deep and dark web. Research and analyze trends and technical developments in Cybercrime, Hacktivism, and Advanced Persistent Threat (APT) actors, intent, and capability, and tactics, techniques, and procedures (TTPs) development. Conducted research on emerging cyber threats, methods, processes, cyber warfare techniques and offensive capabilities. Identify preeminent, occurring, or planned targeted intrusions against the enterprise by leveraging private and public cyber intelligence sources, utilizing existing security tool sets, and advanced analysis methodologies. Conduct web-based research on "open" sources as well as the Darknet, Deep Web, Event and threat correlation, Trend Analysis, Proactive adversary infrastructure identification and tracking, Strategic security focused consulting and analysis. Conduct analysis of the mobility report to identify application vulnerabilities on government furnished devices. Work in collaboration with support elements to test and evaluate solutions to assist in meeting objectives.
-
Counter Intelligence AnalystMantech Dec 2019 - May 2022Herndon, Virginia, UsProvides timely, accurate, effective multi-discipline counterintelligence analysis in support of the US Army combating terrorism, ground system technologies, and counterintelligence investigation, operations, and activities; as the contractor lead overseeing 12 members of the USACIC Threat Network Discovery Task Force.Provides support to counterintelligence targeting. Develops CI leads, based on the Group Synchronization Targeting Strategy, through open-source and classified source research. Develops targets and target systems for joint lethal and non-lethal engagements; develops target nominations, create database records, and database target intelligence products through the use of fusion analysis. Produces all-source analytic damage estimates and battle damage assessments and assists with combat assessment requirements. Additionally, conducts collateral damage estimation, performs target list management, target strategy development, and provides joint target intelligence support to deliberate and dynamic target engagements.Provides intelligence support for strategic engagement policy throughout the Areas of Operational Responsibility (AOR) and Areas of Interest (AOI). Monitors and analyzes all strategic and operational aspects of political, military, and economic developments for the countries in the AORs and AOIs. Assesses future and on-going political-military developments, military capabilities and doctrine, weapons acquisitions, and employment of military forces within each country. Researches, authors, and coordinates threat assessments to support the Commander and the other senior leadership. -
Partner Engagements Foreign LiaisonU.S. Army Cyber Command/ Caci Nss Nov 2019 - Dec 2019Fort Eisenhower, Ga, UsProvide support to foreign partner portfolio manager and advancing partnerships in support of the USCYBERCOM and enhanced foreign intelligence exchange relationships. Collaborated with other cyber commands, intelligence community (IC), and US government agencies to synchronize and de-conflict command effort with Department of Defense and IC priorities and implement procedures meeting strategic goals and objectives for partner engagements. -
Operations Counter Intelligence AnalystInsight Global Consulting Group, Inc. Sep 2019 - Nov 2019UsProvided timely, accurate, effective multi-discipline counterintelligence analysis in support of the US Army combating terrorism, ground system technologies, and counterintelligence investigation, operations, and activities. As a member of the Investigations and Operations Support Branch, I provided analytic support to US Army counterintelligence operations and investigations and analyzed information obtained from sensitive operations and investigations, utilized information to increase US Army knowledge of foreign intelligence threats while maintaining appropriate security of the information. -
Microsoft Software & Systems AcademyMicrosoft Mar 2019 - Aug 2019Redmond, Washington, UsMSSA is a full time, hands-on IT training program developed by Microsoft in partnership with Embry-Riddle Aeronautical University to prepare transitioning service members for careers in technology. Learning objectives include: • Installing and configuring Windows Server 2016 roles such as DNS, DHCP, Active Directory Domain Services, Domain Controllers, and Certificate Authorities to locally and remotely manage networks and machines.• Troubleshooting technical issues in Windows Server 2016 environments and taking corrective measures to restore network and system functionality. • Addressing common business’ IT challenges by implementing storage and high availability solutions such as Network Load Balancing, Failover Clusters, and Fault Tolerance.• Implementing and configuring Hyper-V virtual machines to optimize hardware capacity and maximize resource utilization to keep overhead costs to a minimum. • Performing the monitoring, installation, modification, testing, and servicing of network equipment to ensure optimal performance of resources. -
Military Intelligence SpecialistUs Army Mar 2017 - Aug 2019Arlington, Virginia, Us- Processed and Managed over 4,500 Security Clearances using JPAS/DISS Database.- Screened over 3,200 user account creations through Network Enterprise Center.- Managed Lenel Database providing Controlled Access Program & Server for over 4,500 Access Badges.- Supervised TS/SCI facility while monitoring day to day operations for 242 personnel. -
Military Intelligence SpecialistUs Army Dec 2013 - Mar 2017Arlington, Virginia, Us- Supervised a 14 member section responsible for maneuvering across Europe and the Middle East establishing Satellite communication locations in support of the U.S. Army European Command.- Utilized DOD Clarence databases to maintain proper control measures for secure location access. -
Battalion Intelligence Analyst (S2)Us Army Jul 2012 - Nov 2013Arlington, Virginia, UsMaintained Physical security for eight companies. Provided inspection programs for all classified and sensitive areas. Accountable for tracking and monitoring over 1,000 security clearance statuses and renewals. Responsible for all personnel derogatory action and access suspensions in the Joint Personnel Adjudication System. -
Security Forces Assistance Team (Sfat) Intelligence Lead Trainer (Deployed)Us Army May 2011 - Jun 2012Arlington, Virginia, UsAssisted in joint operation between the U.S. Army and the Dand District Police force. During a nine-month deployment to Kandahar, Afghanistan, SFAT 5 Provided Training and execution of over 20 Tactical systems. In addition to training and instruction, SFAT 5 provided oversight on more than 400 operations within Dand District, Kandahar Afghanistan. -
Military Intelligence SpecialistUs Army Sep 2008 - May 2011Arlington, Virginia, UsMaintained Physical security for eight companies. Provided inspection programs for all classified and sensitive areas. Accountable for tracking and monitoring over 1,000 security clearance statuses and renewals. Responsible for all personnel derogatory action and access suspensions in the Joint Personnel Adjudication System. -
Military Intelligence Specialist Deployed Battalion Intelligence OperatorUs Army Aug 2007 - Aug 2008Arlington, Virginia, UsProvided tactical level intelligence support while deployed to Baghdad, Iraq. Gathered daily intelligence information from both classified and unclassified to compile with historical data to produce assessments, resulting in successful operations and influence within unit’s area of operation. Disseminated over 370 intelligence-based information in order to assist in Battalion level operations. -
Military Intelligence StudentUs Army May 2007 - Aug 2007Arlington, Virginia, Us- Attended Advanced Individual Training to prepare for Intelligence opportunities within the U.S. Army. -
Military BasicUs Army Jan 2007 - Apr 2007Arlington, Virginia, Us- Attended Basic Training.
Kyle O. Skills
Kyle O. Education Details
-
University Of Maryland Global CampusCybersecurity Technology -
Embry-Riddle Aeronautical UniversityCommand Control And Information Operations -
Cochise CollegeMilitary Strategic Intelligence -
Cochise CollegeMilitary Strategic Intelligence -
Jacksonville State UniversityGeneral Studies
Frequently Asked Questions about Kyle O.
What company does Kyle O. work for?
Kyle O. works for Cyint Government Services Llc
What is Kyle O.'s role at the current company?
Kyle O.'s current role is Cyber Threat Analyst.
What is Kyle O.'s email address?
Kyle O.'s email address is ky****@****ech.com
What schools did Kyle O. attend?
Kyle O. attended University Of Maryland Global Campus, Embry-Riddle Aeronautical University, Cochise College, Cochise College, Jacksonville State University.
What skills is Kyle O. known for?
Kyle O. has skills like Leadership, Military, Domain Name System, Military Operations, U.s. Department Of Defense, Government, Dynamic Host Configuration Protocol, Microsoft Office, Microsoft Excel, Hyper V, Training, Active Ts/sci Clearance.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial