Michael Ortiz

CEO

Arlington, Virginia, United States24 yrs 6 mos experience

Key Highlights

  • Over 25 years of expertise in cybersecurity solutions.
  • Proven ability to design resilient network architectures.
  • Expert in offensive cyber operations and red teaming.
Stackforce AI infers this person is a Cybersecurity Infrastructure Architect with extensive experience in offensive security and network solutions.

Contact

Skills

Core Skills

Red TeamingOffensive CyberPenetration TestingSolutions ArchitectCyber Warfare

Other Skills

HackingOffensive SecurityWindows Domain ExploitationEthical HackingMITRE ATT&CKThreat ManagementCyber Security ResearchCyber Security R&DCyber Threat Intelligence (CTI)Threat & Vulnerability ManagementVulnerability ResearchNetwork EngineeringRoutingCyber OperationsNetwork Architecture

About

Experienced Network Solutions Architect, Red Team Infrastructure Engineer, and Offensive Cyber Professional with over 25 years of expertise in designing, implementing, and optimizing advanced cybersecurity solutions. Adept at building scalable, secure, and stealthy infrastructures to support red team operations, threat emulation, and adversarial testing. Proven ability to design and deploy resilient network architectures that enable seamless execution of complex cybersecurity engagements while ensuring operational efficiency and adaptability. As a Network Solutions Architect, I specialize in crafting tailored infrastructures integrating virtualization platforms, secure communication channels, and automated processes to meet the demands of dynamic cyber operations. Skilled in aligning technical solutions with mission objectives, I deliver environments optimized for both offensive and defensive capabilities, ensuring comprehensive and effective threat simulation. In red team operations, I excel at executing the full engagement lifecycle, from infrastructure setup and adversary emulation to post-operation analysis. My expertise includes custom tool development, obfuscation techniques, and advanced exploitation frameworks that mimic real-world adversarial tactics. This approach rigorously tests security across people, processes, and technology, delivering actionable insights to stakeholders and enhancing organizational resilience. With extensive experience in offensive and defensive cyber operations (OCO/DCO), I bring a deep understanding of threat landscapes and mitigation strategies. My background includes leading diverse teams through high-pressure projects located in remote and austere environments, managing multi-million-dollar budgets, and executing mission-critical objectives. Leveraging my Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance, and Reconnaissance (C5ISR) expertise, I integrate strategic vision with technical execution to achieve impactful results. Committed to innovation and excellence in cybersecurity, I continuously evolve methodologies to address emerging threats, refine red team operations, and design robust network solutions. Whether developing bespoke architectures, leading adversarial engagements, or mentoring teams, I deliver solutions that enhance security resilience and operational effectiveness. Passionate about advancing organizational cybersecurity maturity, I ensure my work empowers teams to proactively address vulnerabilities, improve defenses, and thrive in an evolving digital landscape.

Experience

24 yrs 6 mos
Total Experience
2 yrs 10 mos
Average Tenure
1 yr 8 mos
Current Experience

Peraton

Red Team Engineer - Red Cell, US Department of State

Sep 2024Present · 1 yr 8 mos · Arlington, VA · Hybrid

  • Operating as a member of the Red Team, within the Department of State’s Red Cell, performing long-term, persistent adversary emulation engagements that replicate APT-level tradecraft. Focused on the technical execution of threat simulations targeting enterprise networks, with emphasis on initial breach, privilege escalation, lateral movement, and long-term persistence. Responsibilities include crafting tailored initial access payloads via phishing, maldocs, DLL sideloading, and direct exploitation of exposed services. Post-compromise activities involve custom loader design, in-memory execution techniques (e.g., reflective PE injection, .NET CLR abuse, BOF-based tradecraft), and advanced evasion of EDR/XDR tooling. Heavily involved in the design and deployment of custom malware and offensive tooling to support operational objectives, ranging from bespoke implants and shellcode loaders to covert C2 channel implants utilizing protocol mimicry, process sacrifice, and DLL hollowing.
  • Maintain and iterate on fully cloud-hosted Red Team infrastructure, including hardened redirectors, payload servers, and C2 platforms (Cobalt Strike, Sliver, Mythic, Outflank C2, etc). Frequently develop operational tooling and scripts in C/C++/C#, PowerShell, and Python to bypass behavioral detection, avoid signature-based inspection, and enable access persistence via service abuse, WMI event subscriptions, registry hijacking, and domain artifact manipulation.
  • Collaborate closely with detection engineers to map activity to MITRE ATT&CK and drive improvements in detection logic, telemetry visibility, and response playbooks based on offensive findings, as well as work with stakeholders to remediate findings and mitigate future potential threats to that attack surface.
Red TeamingHackingCyber WarfareOffensive CyberOffensive SecurityWindows Domain Exploitation+1

Synack red team

Security Researcher

May 2024Present · 2 yrs · Remote

  • The Synack Red Team is a private freelance security research team that spans 6 continents and over 80 countries. Comprised of some of the most sought-after security researchers in the world, the Synack Red Team provides web application, mobile application, and host infrastructure penetration testing engagements.
Cyber WarfareMITRE ATT&CKThreat ManagementCyber Security ResearchEthical HackingCyber Security R&D+6

Govcio

FMS Network Solutions Architect

Jun 2022Sep 2024 · 2 yrs 3 mos · Tampa, Florida, United States · Hybrid

  • Provided technical guidance, mentorship, and oversight of multiple engineering teams working on key, critical projects in the Eastern European and South American theaters. The projects include network modernization, tech refreshes, and the design, deployment, and integration of core network or perimeter defense security stacks. Projects are scoped from the initial technical direction, outlining the scope of the project and the budget caps. From there, each project follows through the design, procurement, and installation/integration phases before transitioning to the Host Nations. The projects provide defense-in-depth across boundary premises, nationwide enterprise networks, and internal security operations centers, leveraging various solutions from Enterprise Networking to MPLS Black Core to Zero Trust Architectures. These projects are at the forefront of COCOM’s Cyber initiatives, establishing secure air-gapped networks for the Host Nations' Command and Control and denying aggressor nations/threat actors access and maneuverability across the cyber landscape.
Solutions ArchitectCyber WarfareNetwork EngineeringRed TeamingRoutingCyber Operations+3

Ntg (northern technologies group, inc.)

Sr Network Engineer

Jul 2019Jun 2022 · 2 yrs 11 mos · CENTCOM HQ, Macdill AFB - Tampa, FL

  • Worked as a Senior Network Engineer in US Central Commands Engineering Division. E-Div's mission is to provide full-scope cradle to grave engineering solutions that span the scope of the customers (subordinate units) unique needs in theater and on the battlespace. Engineering solutions are seen through from proposal to procurement, to installation, and finally, transfer to Operations and Maintenance team on the ground after warranty phase. Supported multiple efforts in theater, such as T1 POP install in Bahrain, Qatar, and other locations in theater. Lead engineer for Bright Star, a multilateral combined arms exercise between the US and host nation in Egypt. Helped maintained a global bilateral network of multiple host nations, US, NATO, and FRAFVEY nations called CPN (Coalition Partner Network). Supported multiple classified initiatives and engineering support to maintain Commander USCENTCOM C4.
Solutions ArchitectCyber Warfare

Iap worldwide services

Enterprise WAN Engineer

Jun 2017Jul 2019 · 2 yrs 1 mo · Kabul, Afghanistan

  • As the Enterprise WAN Engineer, I was responsible for the E&I of a new and highly robust Data Center for the Afghanistan Ministry of Interior and Ministry of Defense, as well as the day-to-day O&M. Both networks utilized a highly converged and secure design, multiple VRF and routing instances ensure protection from both external and internal threats, and a security stack that provides the protection, visibility, and defense in depth mirroring that of the DOD JRSS products. Both networks consist of about 10000 users spread over 185 sites each, all utilizing old and deprecated technologies. The goal is to provide an aggressive lifecycle management program to remove outdated devices, uplift the sites with current-generation technology, and rebuild the infrastructure and architecture of both networks seamlessly.
Solutions Architect

General dynamics information technology

Network Engineer

Aug 2016May 2017 · 9 mos · Bagram Airfield, Afghanistan

  • Provided staff support under the 160th AITEL contract, and this includes engineering, network compliance, and QC support for the Southwest Asian Theater and the entire AO of Afghanistan, covering multiple bases and FOBS.
  • My duties include the formulation of new solutions, the monitoring of the life cycle of critical equipment and management of tech refresh cycles, and the implementation of a detailed QC program to ensure STIG and DoD compliance.

Raytheon

Principle Systems Engineer (Cyber)

Mar 2016Aug 2016 · 5 mos · Abu Dhabi, United Arab Emirates

  • I provided network operations and engineering support for the final phase and build-out of a versatile and robust Cyber Security Operations Center for a classified customer in the UAE, under a strict NDA.

Ntg (northern technologies group, inc.)

Network Engineer

Oct 2014Mar 2016 · 1 yr 5 mos · Camp Lemonnier, Djibouti

  • As a Network Engineer I delivered support for NIPR, SIPR, and CXI networks for the base and FOBS, resolved tickets, and delivered support for Call Manager/VOIP services.
  • Other achievements included:
  • Managed and maintained the TLA stack and monitored multiple transport links and equipment for the primary MPLS links as well as the DKET and Satellite circuits
  • Engineered and implemented a long range network extension using MLOS to extend services outside the base to ASP and Ammo Supply Technicians, and maintained numerous inline and bulk encryptors
  • Implemented policies and in accordance with JTF-HOA, CLDJ N6, 5th Signal Command and AFRICOM J6 requirements

Itt-exelis

Bagram Network Operations Center Lead

Feb 2012Sep 2014 · 2 yrs 7 mos · BAF, Afghanistan

  • In this role I directed 21 Network Administrators to provide end-to-end communications for the entire Bagram NIPR, SIPR, and CXI Tier 2 network, which comprised of close to 2 000 Layer 2 and Layer 3 devices spread over 3 separate networks, including a combination of strategic and tactical networks providing services from the desktop up to the Tier 1.5 WAN demarcation.
  • My achievements included:
  • Engineered and directed base-wide, regional and theater 802.1x deployments
  • Overhauled the CX-I network, and achieved a total combined downtime of less than 9 minutes for the whole base
  • Conceptualized and implemented the network infrastructure for the Resolute Support Facility (RSF), an HQ building
  • housing over 900 users, and executed the network transition of USFOR-A from Camp Phoenix into the RSF HQ
  • Launched the movement of Bagram into the hub and developed bespoke architecture for remote FOBs in RC-EAST,
  • and provided remote management and oversight of the outlying FOBs and Camps from Bagram HUB
  • Served as the Acting Bagram Site Lead frequently and managed operations for over 90 personnel

United states marine corps

6 roles

JTF: GTMO J-6 , Current Ops SNCOIC

Apr 2011Dec 2011 · 8 mos

  • I served as the Project Manager and Current Operations Communications Chief and directed the delivery of network and communication services for the GWOT mission, as well as for a broad range of needs for detainee operations.
  • Furthermore I led over 35 contractors and civilian staff to deliver support to mission operations and day-to-day assignments.
  • My achievements included:
  • Engineered an audio/video solution using VBrick hardware to provide multicast streaming to selected terminals on the
  • base, and to deliver multiple VSAT solutions to Crystal City, the Pentagon, and various undisclosed locations, for the
  • pre-trial and trial proceedings of Khalid Sheik Mohammed and other high level detainees
  • Delivered communications and security operations for 2 ICRC visits, VIP support for family members of victims media
  • delegations, and trial Lawyers, as well as for detainee movement operations

Data Chief, MWSS-374, 3MAW USMC

Jul 2009Mar 2011 · 1 yr 8 mos

  • As a Data Chief I led 18 Marines to deliver multiple domain level (mv1 - mv9.usmc.mil) network support and engineering for incoming training units, in preparation for deployments to Afghanistan.
  • In addition I provided multiple units with data network transport and communication services in support of the Mojave Viper and Steel Knight pre-deployment training packages.
  • Deployments included multiple WTI exercises in MCAS, YUMA, Mojave Viper exercises, as well as all squadron level training exercises, field operations, and multiple airfield operations.

Data Chief, 12th Marine Regiment, 3MARDIV USMC

Jun 2008Jun 2009 · 1 yr

  • In this position I directed 13 Marines to support assigned operations, overhauled the architecture and network, and implemented equipment that boosted the command and control capabilities significantly.
  • Operations included UFL: Korea, multiple field training exercises to prepare and field test the new equipment for the regimental deployment to Camp Fuji and Yatsubetsu Japan, as well as various other UDP missions

Communications Technician / Data Chief, MARFORSOUTH, G-6 USMC

Jan 2006Jan 2008 · 2 yrs

  • As a Comm Tech/Data Chief I delivered communications for data, VOIP, SatComm, radio, and VTC services in tactical and garrison environments. I led 3 highly competent Marines to provide garrison support, and to contribute to the planning and execution of missions in the South American, Central American, and Caribbean Theater.
  • Our operations included Tradewinds 2007/2008, Partnership of the Americas, and diverse humanitarian, foreign military, and counter-narcotic operations.

Data Network Specialist, 2nd FSSG (2MLG), IIMEF USMC

Promoted

Dec 2002Dec 2005 · 3 yrs

  • Provided tactical data network services for Company and Battalion level combat operations during OIF, OIF 2-1, OIF 3-6. Responsible for managing small unit teams for providing tactical support on the move, utilizing a variety of RF and SatComm equipment as transmission paths, during combat operations with Task Force: Tarawa, 3rd Bn/8th Marine Reg., and 1MarDiv. Assigned as the Senior Platoon Sergeant for CSSD-28 (CLB-8) Communications Platoon, managing and employing a team of 84 Marines in various communication MOS’s, to provide full support for regimental and battalion combat operations for OIF 3-6, Fallujah Iraq.

Network Administrator, 7th Comm Bn / IIIMEF G-6

Oct 2000Nov 2002 · 2 yrs 1 mo

  • Entry level technician providing helpdesk support as a junior technician and basic network administrator. Deployed in support of various operations including Operation: Tandem Thrust, Operation: Cobra Gold, Operation: UFL, and the MEU: SOC accreditation. Provided support for System and Network Engineering services as a Tier 1 (Top Level) Administrator for the USMC Enterprise Level Domain (iiimef.usmc.mil) which was the highest authority for all major subordinate commands on Okinawa.

Education

Institute for Veterans and Military Families - IVMF

Entrepreneurship Bootcamp for Veterans (EBV) — Entrepreneurial and Small Business Operations

Jun 2025Aug 2025

Saint Leo University

Master of Science Degree — Cybersecurity

Aug 2024Jun 2025

St. Petersburg College

Bachelor of Applied Science - B.A.S — Cybersecurity

Jan 2022Jul 2024

Marine Corps Communications and Electronics School

Jan 2000Jan 2000

Marine Corp Recruit Training

Jan 2000Jan 2000

Lake Brantley High School

Jan 1996Jan 2000

Institute for Veterans and Military Families - IVMF

Military Founders Lab — Entrepreneurial and Small Business Operations

Sep 2025Nov 2025

Stackforce found 100+ more professionals with Red Teaming & Offensive Cyber

Explore similar profiles based on matching skills and experience