J

Jordan M.

Security Engineer

Washington, DC, United States6 yrs 6 mos experience
AI EnabledAI ML Practitioner

Key Highlights

  • Expert in Digital Forensics and Cybersecurity Incident Response.
  • Proficient in Threat Modeling and Penetration Testing.
  • Strong background in Software Development and Reverse Engineering.
Stackforce AI infers this person is a Cybersecurity Specialist with expertise in Digital Forensics and Incident Response.

Contact

Skills

Core Skills

Digital ForensicsCybersecurity Incident ResponseThreat ModelingPenetration TestingScadaReverse EngineeringIncident Response

Other Skills

Incident ManagementRust (Programming Language)Software Developmentsoftware defined vehiclesPublic SpeakingArtificial Intelligence (AI)SplunkSoftware DesignSplunk Enterprise SecurityPythonMetasploitCisco Firewall SecurityWiFiPLC Ladder LogicBluetooth

Experience

6 yrs 6 mos
Total Experience
11 mos
Average Tenure
11 mos
Current Experience

Google

Security Engineer

Jun 2025Present · 11 mos · On-site

Digital ForensicsCybersecurity Incident ResponseIncident Management

Mandiant (part of google cloud)

Senior Security Consultant

Jun 2023May 2025 · 1 yr 11 mos · On-site

Threat ModelingRust (Programming Language)Software Developmentsoftware defined vehiclesPublic SpeakingArtificial Intelligence (AI)+4

United states department of defense

Analyst

Jun 2022Jun 2023 · 1 yr · On-site

Penetration TestingPythonMetasploit

Cybersecurity and infrastructure security agency

IT Specialist

Jul 2020Jun 2022 · 1 yr 11 mos · Washington DC-Baltimore Area

  • Defended IT/OT infrastructure, public, and private US-based companies against nation state bad
  • actors by applying forensically sound incident response playbooks to a wide range of scenarios. My expertise was used for digital forensics at-scale, devops, reverse engineering, and threat intelligence analysis.
SCADAPythonCybersecurity Incident Response

Soc llc

Security Intern

Oct 2019Dec 2019 · 2 mos · Melbourne, Florida Area · Remote

  • Utilize Forensic chain-of-custody procedures to black-box a device of unknown origin and make weekly reports to upper-management on progress.
Digital Forensics

The johns hopkins university applied physics laboratory

Reverse Engineer Intern

May 2019Aug 2019 · 3 mos · Laurel, Maryland

  • Reverse Engineered firmwares with both static and dynamic tools including Ghidra, IDA, and Frida with x86 and ARM binaries.
  • Selected out of 500 interns on an Android mobile app to help visitors, new hires, and those with physical disabilities navigate the lab. Lead the indoor-positioning-systems using Bluetooth 5 hardware.
Reverse Engineering

Idaho national laboratory

Software/Reverse Engineer Intern in the Cyber R&D Department

May 2018Aug 2018 · 3 mos · Idaho Falls, Idaho

  • Created and organized a wireless CTF (Wi-Fi, Bluetooth, and SDR challenges) for 40 participants.
  • Audited various ICS customers machines using assorted forensic tools
  • Created a portable wireless pentesting lab which is now used across INL for both internal and external training.
  • Investigated numerous technologies and techniques to advance the team’s knowledge, including:
  • Bluetooth and its various vulnerabilities including bluesnarfing, bluejacking, and bluebugging.
  • GPS spoofing using HackRF One and GNURadio while successfully created a working FM radio receiver and demonstrating a replay attack on vehicles.
  • 802.11p and 802.15.4 (Zigbee) and their vulnerabilities while also exploiting the Killer Bee vulnerability
  • Wireless wardriving and demonstrated its effects
  • OSINT and applied concepts and tools to various mock scenarios
  • V2X technology and uses while also representing my project in a Lab-wide poster session with various stakeholders and their inquiries
  • Tested forensics tools used by INL employees on red team engagements whose results were sent to DHS to request changes in the software.
  • Assisted in forensic research of the Waterfall data diode used in ICS/SCADA systems
  • Participated in INL’s Industrial Control Systems training while, during the mock engagement I was selected as the physical control systems captain that involved interfacing with the various team leads and working alongside my team to improve the efficiency of the systems while also hardening the electric grid, PLC’s, HMI’s, and remote connections; in the end, the entire Blue team was victorious against the Red team.
  • Deciphered communication protocols coming from Road-Side Units and On-Board Units
WiFiSCADAPLC Ladder LogicBluetoothsoftware defined vehiclesSoftware Defined Radio+1

Ibm

Managed Security Services (MSS) Security Services Specialist Intern

May 2017Aug 2017 · 3 mos · Sandy Springs, GA

  • Project managed and assisted with development of a security related project, code name: White Dog Security Service to focus on physical security utilizing Watson Visual Recognition and Watson Language Translation services. Utilized Agile methodologies and Design Thinking in execution of project. Developed a working prototype of application using NodeJS.
  • Assisted in building and configuring Hayvn endpoint systems for alpha release
  • Documented guides for multiple IBM third-party programs, services and API’s. Then created a python script to translate csv file of rules into Firewall-specific API syntax
  • Built custom encoder utilized in multiple MSS systems in PHP
  • Participated in IBM-only CTF and came in 4th/30 place
  • Tools: QRadar (Advisor), Watson, Hayvn, Remedy DB
Penetration TestingPythonAgile MethodologiesArtificial Intelligence (AI)C++

Florida state university it security and privacy office

Security Operations Center (SOC) Intern

Jan 2017Jan 2019 · 2 yrs · Tallahassee Metropolitan Area

  • Handled ticketed network and security complaints from entire University staff, faculty, and students.
  • Responded to forensic investigations ad-hoc, including those partnering with FSUPD and the Tallahassee Police Department.
  • Documented Incident Response Procedures, hardening guidelines, and accounted for all softwares and technology used on campus.
  • Assisting in the organization of a "Fusion Center Plan" team comprised of all high-level technical employees to collaborate on different netsec issues affecting the University.
  • Automated data entry from Outlook to Sharepoint
  • Formalized the internship program for future interns.
  • Tools: Rapid7 Nexpose (with Agent Bots), Microsoft Sharepoint, MS-ISAC, Cisco's Talos , McAfee Firewall, Splunk
SplunkCisco Firewall SecurityIncident Response

Clarfield, okon, salamone, & pincus, p.l.

Finance Intern

Jun 2015Aug 2015 · 2 mos · 500 S Australian Ave # 730, West Palm Beach, FL 33401

  • Proficient in Quickbooks, MS Excel, Perfect Practice, and Real Remittance.Preparation of financial statements and presentations to shareholders, posting payments,recording and analyzing revenue streams.Opportunity to observe the cases the firm was involved in.

Education

Florida State University

Master of Science - MS — Computer Science

Jan 2018Jan 2019

Florida State University

Bachelor’s Degree — Computer Science with a minor in General Business

Jan 2014Jan 2018