Mark Sweet - Cyber Tactician - Technical Nexus -Leader
I am a Cyber Threat Engineer with over 15 years in Information Technology and Cybersecurity in the public and private sector. My goal is to emulate sophisticated threats to information security to inform cyber defenders and organizational leaders on the dangers they pose and mitigations for their hostile effects.


MY STRENGHTS
Tactician
Understanding not just the technical complexity of the single hack but the impact of the entire adversarial campaign.
Communication
Translating the needs of non-technical customers to technical operators and technical operations to non-technical audiences.
Creativity
Designing cyber threat emulation engagements that cost-effectively answer customer questions.
Leadership
Servant-Leader. Building and empowering teams to achieve sustainable results.
MY EXPERIENCE
Cyber Threat Engineer @ National Nuclear Security Administration (NNSA)
Aug 2022 - Present
Leading Cyber Threat Emulations:
-Red Team
-Purple Team
-Insider Threat
-Physical and Electronic Based Threat Vectors
Tool/Malware Research
Fusion Nexus of Intelligence Organizations, Red Team, Blue Team, and Senior Management
Plans Red Team Engagements consulting with non-technical audiences to translate customer needs into technical requirements
Authored all Red Team Operational Template Documents
Plans Engagements and Authors Rules of Engagements
Creates Digital Twins of Network Environments using RedSeal to identify cybersecurity weaknesses
Red Team Operator / Cybersecurity Inspector @ Joint Forces Headquarters-Department of Defense Information Network (JFHQ-DODIN)
Oct 2018 - Aug 2022
Conducted threat emulations against Department of Defense (DOD) Organizations to measure detection and response capabilities
Utilized Open Source and Commercial Platforms and Software for Threat Emulation
Tool/Malware Research
Conducted cyber inspections of Department of Defense (DOD) Organizations for compliance with Department of Defense (DOD) cyber defense requirements published by United States Cyber Command
Authored Cyber Inspections Standards
Trained Federal Organizations and Inspectors in Inspection Standards and Methods


Blue Team Windows Analyst / Systems Administrator / Mitigations Analyst @ Department of Defense
Sep 2012 - Oct 2018
Conducted analysis of Windows Operating Environments to identify security weaknesses and misconfigurations
Administered Windows and Linux-based Custom Intelligence Collection Platforms
Created Mitigations to Leading Cybersecurity Threat Vectors for Rapid Solutions Deployment
Cyber Threat Emulation Team Leader (Captain / O-3) @ United States Army
Sep 2012 - Oct 2018
Leading Cyber Threat Emulations:
-Red Team
-Purple Team
-Insider Threat
-Physical and Electronic Based Threat Vectors
Tool/Malware Research
Fusion Nexus of Intelligence Organizations, Red Team, Blue Team, and Senior Management
Plans Red Team Engagements consulting with non-technical audiences to translate customer needs into technical requirements
Authored all Red Team Operational Template Documents
Plans Engagements and Authors Rules of Engagements
EDUCATION
Carnegie Mellon University
MS in Information Assurance 2017 - 2017
University of Nevada Las Vegas
BS in Management of Information Systems 2005 - 2009
PUBLICATIONS
Strategic Theories Employing Specialty Cyber Teams
Amazon: https://a.co/d/0Sz8fc2
United States Army
Intelligence Officer Captains Career Course 2012 - 2012
United States Army
Signal Officer Basic Course 2009 - 2009
United States Army
Primary Leadership Development Course 2004-2004
CERTIFICATIONS
eLearnSecurity - eLearning Junior Penetration Tester
Cert Number: 7939669
CompTIA - Security+
Code: MYT1DYR2WHEEKVDB
EC-Council - Certified Ethical Hacker
Cert Number: ECC41200077496
ACHIEVEMENTS
EC-Council - Certified Ethical Hacker Hall of Fame
Cert Number: HOF-2023-1400035
