Tanner G.

CEO

O'Fallon, Illinois, United States13 yrs 4 mos experience

Key Highlights

  • Over a decade of experience in cybersecurity.
  • Proven track record in team leadership and strategic initiatives.
  • Expert in incident response and cyber analytics.
Stackforce AI infers this person is a Cybersecurity Expert with a focus on Incident Response and Cyber Analytics.

Contact

Skills

Core Skills

CybersecurityLeadershipIncident Response

Other Skills

Information Security AnalysisCyber Security RiskKibanaOperational PlanningCybersecurity Incident ResponseIncident HandlingTrainingStrategyEngineeringNetwork AdministrationHack The Box Academy

About

With a dynamic career spanning over a decade in cybersecurity, I am a results-oriented and forward-thinking leader with a proven track record of building and empowering high-performing teams, driving strategic initiatives, and safeguarding critical assets for the U.S. Department of Defense. My journey, from the hands-on technical expertise of a CyberWarfare Operator in the U.S. Air Force Reserves to my current role as a Cyber Data Analysis Lead, has instilled in me a deep understanding of the entire cybersecurity lifecycle, from threat identification and incident response to proactive analysis and strategic leadership. My aspiration is to continue to evolve as a leader who not only excels in the technical complexities of cybersecurity but also inspires and mentors the next generation of cybersecurity professionals. I am driven by a passion for fostering collaboration, promoting a culture of continuous improvement, and conceptualizing innovative solutions to counter emerging threats. My experience in managing diverse teams, interfacing with senior leadership, and contributing to business development has solidified my commitment to a leadership path that is both technically grounded and strategically focused. I am eager to leverage my extensive experience in incident response, cyber analytics, and team leadership to take on new challenges and contribute to a mission-driven organization at a higher strategic level. My goal is to continue to grow as a leader, not just by title, but by the positive impact I have on my team, the security of our nation's digital infrastructure, and the advancement of the cybersecurity field as a whole.

Experience

Caci international inc

5 roles

Cyber Data Analytics Lead

Promoted

Feb 2025Present · 1 yr 2 mos

  • Leads cybersecurity engineers who build, enhance, and maintain complex software systems for the US Intelligence Community.
  • Provides oversight of team work assignments through ServiceNow ticketing system.
  • Serves as a technical lead and point of escalation on architecture, system function, and other tasking for a team of 15-20 engineers
  • Ensures staff development and training
  • Collaborates with senior leadership and other engineering discipline leads.
  • Identifies and oversees the discovery and implementation of process improvements.
  • Interfaces directly with customers and briefs at program reviews as the CDA representative
  • Monitors progress across programs and collaborates with program managers to track schedules and ensure successful completion
  • Contributes to new business development and proposals as a subject matter expert, conceptualizing technical solutions and providing detailed estimates of resources and schedule
  • Provides active leadership and encourages team collaboration, fosters operational improvement, and provides constructive feedback. Creates a great team and leads from the front.
  • Schedules team members to cover the 5-days a week, 16hrs a day, with 2hr recall for multiple technologies, emergencies authorized outages, and break fix incidents.
Information Security AnalysisCyber Security RiskKibanaOperational PlanningCybersecurity Incident ResponseIncident Response+7

Advanced Cyber Analytics Lead

Oct 2023Apr 2025 · 1 yr 6 mos

  • Leads Engineers on related taskings to maintain timelines for project objectives
  • Analyzes trends and patterns of data on networks to identify and predict previously undiscovered events and incidents, and develop or tune rules/signatures/scripts as needed
  • Coordinates with other Cybersecurity Operations to develop or tune rules/signatures/scripts
  • Coordinates with other Cybersecurity Operations Services to investigate and obtain information about potential sources of compromise on systems, and develop or tune rules/signatures/scripts as needed
  • Correlates and analyzes precursors to incidents, and develop or tune rules/signatures/scripts as needed
  • Improve SIEM alert efficiency though evaluation of valid alerts and false positives, and develop or tune rules/signatures/scripts as needed
  • Assists the Cyber Incident Response Team by assessing ongoing incident activity to predict adversary responses and locations of compromise
Cybersecurity Incident ResponseIncident ResponseIncident HandlingCybersecurity

CSOC - Tier 3 Cyber Security Incident Responder

Mar 2023Oct 2023 · 7 mos

  • Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government
  • Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents
  • Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated
  • Coordinates with other contracts, organizations, activities, and services to ensure enterprise recovers from an incident/event
  • Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions.
  • Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events
  • Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services
  • Provides adversary attribution
  • Performs malware analysis and signature development
  • Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis.
  • Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification
CybersecurityIncident ResponseIncident Handling

Advanced Cyber Analytics Engineer

Promoted

May 2022Mar 2023 · 10 mos

  • Analyzes trends and patterns of data on networks to identify and predict previously undiscovered events and incidents, and develop or tune rules/signatures/scripts as needed
  • Coordinates with other Cybersecurity Operations to develop or tune rules/signatures/scripts
  • Coordinates with other Cybersecurity Operations Services to investigate and obtain information about potential sources of compromise on systems, and develop or tune rules/signatures/scripts as needed
  • Correlates and analyzes precursors to incidents, and develop or tune rules/signatures/scripts as needed
  • Improve SIEM alert efficiency though evaluation of valid alerts and false positives, and develop or tune rules/signatures/scripts as needed
  • Assists the Cyber Incident Response Team by assessing ongoing incident activity to predict adversary responses and locations of compromise
Cybersecurity Incident ResponseIncident ResponseIncident HandlingCybersecurity

CSOC - Tier 2/Shift Lead Network Security Analyst

Jun 2020May 2022 · 1 yr 11 mos

  • Triage alerts to identify malicious actors on customer networks
  • Complete moderate-level cyber analysis of potential events
  • Assist Tier 1 analysts with training and assistance when needed to comprehend an exploit better when it is a common occurrence
  • Review DOS monitoring dashboard to recommend blocks on high traffic actors that are malicious.
  • Assist with exercises implemented by offensive team, or when an advanced actor shows a compromise within the network.
CybersecurityIncident ResponseIncident Handling

Us air force reserve

2 roles

Cyber Warfare Operator

Promoted

Feb 2024Present · 2 yrs 2 mos

  • Operates within a specialized team to conduct Defensive Cyberspace Operations (DCO), ensuring the integrity, security, and resilience of critical Air Force and national cyber infrastructure.
  • Employs cutting-edge cyber defense tactics, techniques, and procedures (TTPs) to detect, deter, and defend against cyber threats, maintaining operational security, and mission effectiveness.
  • Coordinates and executes cyber defense strategies across a range of operations, including real-time incident response, threat hunting, and vulnerability management to protect against espionage, sabotage, and cyber-attacks.
  • Engages in continuous training and professional development activities to stay abreast of emerging cyber threats, technologies, and defense methodologies, ensuring cutting-edge operational capabilities.
  • Synthesized multi-source intelligence into actionable insights for enterprise risk reduction, utilizing research and Kibana visualizations for predictive threat modeling.
  • Utilized analytical expertise to investigate network intrusions, identify malicious activities, and uncover potential insider threats, enhancing organizational security.
  • Developed complex analytics queries and threat visualization dashboards, managing large datasets to inform strategic planning and cybersecurity program enhancements.
Information Security AnalysisCyber Security RiskKibanaCybersecurity Incident ResponseCybersecurityIncident Response

Cyber Transport Specialist

Dec 2012Feb 2024 · 11 yrs 2 mos

  • Provides mission-critical voice, data, and video services, deploy and operate expeditionary communications systems, and monitor the performance of systems and circuits
  • Responsible for testing and troubleshooting network systems equipment and circuits. This may include IP detection systems, which identify cybersecurity breaches
  • Currently assigned to SCADA Hunt Cyber Defense Team to conduct SCADA vulnerability tests to recommend mitigations for insider cyber threats
  • Configures systems in preparation of missions by utilizing Cisco networking equipment, VMWare virtualization hypervisors and Red Hat Enterprise Linux operating systems
  • Proficient in configuring network and server systems to include implementing security in support of the mission
  • Supports additional IT systems as it relates to the mission as needed to include general server, workstation, or peripheral maintenance or repairs

Siemens

Building Automation Specialist

Jan 2018Feb 2020 · 2 yrs 1 mo · Indianapolis, Indiana, United States

  • Install, maintain, and configure/programmed automated networks to include cyber security for these SCADA systems to control industrial HVAC systems and appropriate IP configuration when necessary
  • Configured automated systems by generating a VMWare virtual machine and adding automation stations to a SCADA operator interface to assist network administrators and programmed with Powers Processing and Controls Language(PPCL) and completed mass configuration by Microsoft Excel based scripts.
  • Created graphical user interfaces for customers to see the physical layout of functional devices to assist and provide control to maintenance engineers
  • Provided white lists for network administrators to protect internal networks from inherent insider threat SCADA network vulnerabilities

Airco

Superintendent

Jun 2016Jan 2018 · 1 yr 7 mos · Indianapolis, Indiana, United States

  • Managed up to 20 workers and supervisors at a time to include scheduling personnel, coordination of small projects, and employee review
  • Ensured safety while abating hazardous materials such as asbestos, mold, and lead by following relevant OSHA, AHERA, and NESHAP regulatory guidelines
  • Managed timesheets, vehicle maintenance, inventory, benefits, workplace conflicts, and maintenance of proper staffing of employees

Schlumberger

Dismantle Inspection Fault Analyst (DIFA)

Dec 2014Feb 2016 · 1 yr 2 mos · Dickinson, North Dakota, United States

  • Assembled and installed electronic submersible compression pumps up to 400 horsepower for oil production
  • Disassembled and conducted fault analysis on entire assembly to generate mechanical and electrical failure list
  • Conducted project analysis with engineers to remedy the cause of the faults if possible
  • Implemented programming for pumps, continued operations, and troubleshooting
  • Managed all shipping and receiving of oil field equipment

Whoever had work

Oil Field Tech Work

May 2011Dec 2014 · 3 yrs 7 mos · Oklahoma · Remote

  • Doing various SatCom and network setup for various remote locations, hydro testing, and electrical programming for down hole tools such as measurement while drilling (MWD) utilities or crown boosters

Education

SANS Technology Institute

Master's degree — Information Security Engineering

Nov 2023Dec 2025

Indiana University Indianapolis

Bachelor's degree — Mathematics and Computer Science

SANS Technology Institute

Graduate Certificate — Cybersecurity Engineering

Oklahoma State University

Associate's degree

Community College of the Air Force

Associate's degree — Information Technology

Community College of the Air Force

DCO-NA/CVAH

Stackforce found 100+ more professionals with Cybersecurity & Leadership

Explore similar profiles based on matching skills and experience