Mark Sweet - Cyber Tactician - Technical Nexus -Leader

I am a Cyber Threat Engineer with over 15 years in Information Technology and Cybersecurity in the public and private sector. My goal is to emulate sophisticated threats to information security to inform cyber defenders and organizational leaders on the dangers they pose and mitigations for their hostile effects.

MY STRENGHTS

Tactician

Understanding not just the technical complexity of the single hack but the impact of the entire adversarial campaign.

Communication

Translating the needs of non-technical customers to technical operators and technical operations to non-technical audiences.

Creativity

Designing cyber threat emulation engagements that cost-effectively answer customer questions.

Leadership

Servant-Leader. Building and empowering teams to achieve sustainable results.

MY EXPERIENCE

Cyber Threat Engineer @ National Nuclear Security Administration (NNSA)

Aug 2022 - Present

Leading Cyber Threat Emulations:

-Red Team

-Purple Team

-Insider Threat

-Physical and Electronic Based Threat Vectors

Tool/Malware Research

Fusion Nexus of Intelligence Organizations, Red Team, Blue Team, and Senior Management

Plans Red Team Engagements consulting with non-technical audiences to translate customer needs into technical requirements

Authored all Red Team Operational Template Documents

Plans Engagements and Authors Rules of Engagements

Creates Digital Twins of Network Environments using RedSeal to identify cybersecurity weaknesses

Red Team Operator / Cybersecurity Inspector @ Joint Forces Headquarters-Department of Defense Information Network (JFHQ-DODIN)

Oct 2018 - Aug 2022

Conducted threat emulations against Department of Defense (DOD) Organizations to measure detection and response capabilities

Utilized Open Source and Commercial Platforms and Software for Threat Emulation

Tool/Malware Research

Conducted cyber inspections of Department of Defense (DOD) Organizations for compliance with Department of Defense (DOD) cyber defense requirements published by United States Cyber Command

Authored Cyber Inspections Standards

Trained Federal Organizations and Inspectors in Inspection Standards and Methods

Blue Team Windows Analyst / Systems Administrator / Mitigations Analyst @ Department of Defense

Sep 2012 - Oct 2018

Conducted analysis of Windows Operating Environments to identify security weaknesses and misconfigurations

Administered Windows and Linux-based Custom Intelligence Collection Platforms

Created Mitigations to Leading Cybersecurity Threat Vectors for Rapid Solutions Deployment

Cyber Threat Emulation Team Leader (Captain / O-3) @ United States Army

Sep 2012 - Oct 2018

Leading Cyber Threat Emulations:

-Red Team

-Purple Team

-Insider Threat

-Physical and Electronic Based Threat Vectors

Tool/Malware Research

Fusion Nexus of Intelligence Organizations, Red Team, Blue Team, and Senior Management

Plans Red Team Engagements consulting with non-technical audiences to translate customer needs into technical requirements

Authored all Red Team Operational Template Documents

Plans Engagements and Authors Rules of Engagements

EDUCATION

Carnegie Mellon University

MS in Information Assurance 2017 - 2017

University of Nevada Las Vegas

BS in Management of Information Systems 2005 - 2009

PUBLICATIONS

Strategic Theories Employing Specialty Cyber Teams

Amazon: https://a.co/d/0Sz8fc2

United States Army

Intelligence Officer Captains Career Course 2012 - 2012

United States Army

Signal Officer Basic Course 2009 - 2009

United States Army

Primary Leadership Development Course 2004-2004

CERTIFICATIONS

eLearnSecurity - eLearning Junior Penetration Tester

Cert Number: 7939669

CompTIA - Security+

Code: MYT1DYR2WHEEKVDB

EC-Council - Certified Ethical Hacker

Cert Number: ECC41200077496

ACHIEVEMENTS

EC-Council - Certified Ethical Hacker Hall of Fame

Cert Number: HOF-2023-1400035

Department of Defense -Adjunct Professor

Department of Defense - Career Mentor