Jamal Shakeenab provides his resume, which details over 2 years of experience conducting signals intelligence analysis, geospatial intelligence analysis, and digital network intelligence analysis to support counterterrorism operations while serving in the United States Air Force and Air National Guard. He holds a Top Secret/SCI security clearance and has analyzed communications networks, conducted technical and social network analysis, and authored over 100 intelligence reports.
Jeff Ganahl Intelligence Research Resume 14 June 15Jeffrey Ganahl
Jeffrey Ganahl is an intelligence research specialist with over 21 years of experience in signals intelligence (SIGINT) within the United States Marine Corps. He has expertise in SIGINT policy, tasking, collection, processing, exploitation, and dissemination. Ganahl has held various leadership positions managing daily analytic and intelligence operations and developing training strategies. He has experience deploying in support of operations in Iraq and Afghanistan, supervising SIGINT tasking and analysis to provide intelligence to law enforcement and military customers.
Azavea develops software to analyze large geospatial datasets for social good. Their Big (Geo) Data Science work includes spatial forecasting of crime patterns in Philadelphia using statistical analysis of past incidents. They created automated maps and alerts for the police department to help predict crime hotspots and accelerate response times. Azavea also conducts open source research on high performance geoprocessing techniques to enable analysis of massive global datasets within seconds.
As we develop our crime analysis software, HunchLab, we are always on the look out for ways of examining and improving data quality as well as new academic research that shows promise to enhance crime analysis.
In this one-hour webinar, we first explain some of the ways we examine data quality when we utilize historic incident datasets for research and analysis and how you can use these techniques in your department. Then, we walk through a series of analytic techniques and practices that can help your department improve your crime analysis processes.
Crime Risk Forecasting and Predictive Analytics - Esri UCAzavea
Presentation at the 2011 Esri User Conference that included an overview of HunchLab features related to forecasting, specifically near repeat forecasts and load forecasts.
This document provides contact information for various services at the Madison Sites building, including health services, security, audio visual assistance, the café, building services, help desk, and mail room. It also includes the menu for Starbucks drinks and food items available in sizes of Tall, Grande and Venti. Prices are listed for hot and iced coffee, tea, hot cocoa, espresso drinks, and other beverages. Food items include breakfast items, salads, sandwiches, snacks and fruit.
Defrag 2015 - Hacking the Tech WorkforceMary Scotton
A more personal perspective on my journey and how attendees can make an impact by hacking their company 3 ways: pay attention, be brave, be inclusive.
Defrag, Nov 12, 2015
defragcon.com
Este documento ofrece consejos sobre cómo vivir la vida de manera plena y significativa. Recomienda que las personas tracen sus metas y objetivos basándose en lo que es importante para ellas mismas, que no olviden aquello que les importa, y que vivan el presente en lugar de enfocarse demasiado en el pasado o el futuro. También aconseja no rendirse cuando aún se tiene algo que ofrecer, no tener miedo a admitir imperfecciones ni a enfrentar riesgos, y dar amor para recibirlo.
Jeff Ganahl Intelligence Research Resume 14 June 15Jeffrey Ganahl
Jeffrey Ganahl is an intelligence research specialist with over 21 years of experience in signals intelligence (SIGINT) within the United States Marine Corps. He has expertise in SIGINT policy, tasking, collection, processing, exploitation, and dissemination. Ganahl has held various leadership positions managing daily analytic and intelligence operations and developing training strategies. He has experience deploying in support of operations in Iraq and Afghanistan, supervising SIGINT tasking and analysis to provide intelligence to law enforcement and military customers.
Azavea develops software to analyze large geospatial datasets for social good. Their Big (Geo) Data Science work includes spatial forecasting of crime patterns in Philadelphia using statistical analysis of past incidents. They created automated maps and alerts for the police department to help predict crime hotspots and accelerate response times. Azavea also conducts open source research on high performance geoprocessing techniques to enable analysis of massive global datasets within seconds.
As we develop our crime analysis software, HunchLab, we are always on the look out for ways of examining and improving data quality as well as new academic research that shows promise to enhance crime analysis.
In this one-hour webinar, we first explain some of the ways we examine data quality when we utilize historic incident datasets for research and analysis and how you can use these techniques in your department. Then, we walk through a series of analytic techniques and practices that can help your department improve your crime analysis processes.
Crime Risk Forecasting and Predictive Analytics - Esri UCAzavea
Presentation at the 2011 Esri User Conference that included an overview of HunchLab features related to forecasting, specifically near repeat forecasts and load forecasts.
This document provides contact information for various services at the Madison Sites building, including health services, security, audio visual assistance, the café, building services, help desk, and mail room. It also includes the menu for Starbucks drinks and food items available in sizes of Tall, Grande and Venti. Prices are listed for hot and iced coffee, tea, hot cocoa, espresso drinks, and other beverages. Food items include breakfast items, salads, sandwiches, snacks and fruit.
Defrag 2015 - Hacking the Tech WorkforceMary Scotton
A more personal perspective on my journey and how attendees can make an impact by hacking their company 3 ways: pay attention, be brave, be inclusive.
Defrag, Nov 12, 2015
defragcon.com
Este documento ofrece consejos sobre cómo vivir la vida de manera plena y significativa. Recomienda que las personas tracen sus metas y objetivos basándose en lo que es importante para ellas mismas, que no olviden aquello que les importa, y que vivan el presente en lugar de enfocarse demasiado en el pasado o el futuro. También aconseja no rendirse cuando aún se tiene algo que ofrecer, no tener miedo a admitir imperfecciones ni a enfrentar riesgos, y dar amor para recibirlo.
Rock and metal are popular genres of music. Rock originated in the 1950s and draws influence from blues and country. Metal evolved from rock in the late 1960s and 1970s and features loud, amplified guitars and drums with lyrics often dealing with dark themes.
This document provides a summary of Aaron Thompson's qualifications, experience, and education. Thompson has over 6 years of experience as a signals intelligence analyst for the military, specializing in geospatial analysis, electronic warfare, and computer network analysis. He has deployed to Afghanistan in support of NATO forces and provided tactical intelligence reporting. Thompson is highly skilled in signals intelligence techniques and analysis tools. He holds a Top Secret security clearance and is pursuing an Associate's degree in intelligence operations.
Este documento introduce el tema de higiene y seguridad industrial. Explica que la asignatura cubre los fundamentos básicos y herramientas para prevenir accidentes laborales y enfermedades, así como preservar la salud de los trabajadores. También menciona que se estudiarán la identificación y evaluación de riesgos laborales y sus técnicas de prevención, de acuerdo con las normas legales colombianas.
Neurologists have proven that our thinking, perception and actions are shaped by activity in our brain that occurs outside of conscious awareness or control, this results in unintentional influences that may not align with our values, or the values of your company. We call these unintentional influences "unconscious bias" and they are neither good nor bad. In this interactive workshop, participants will have an experience of how our unconscious mind works, discuss how unconscious patterns impact groups particularly around decision making at work, and put in place strategies and actions that can be taken by each of us to balance conscious intent with unconscious beliefs to build a more inclusive environment.
Janella Campbell is an intelligence analyst with experience conducting all-source analysis and full motion video analysis. She has worked as an intelligence analyst for the Army National Guard and BAE Systems, where she produced reports and briefings. She is seeking a new position where she can use her analytical, research, and technical skills to support intelligence operations.
Dallas T. King III has over 14 years of experience in program analysis, operations planning, and quality assurance for the National Geospatial-Intelligence Agency (NGA). He currently works as a Principal Program Analyst II at NGA, where his responsibilities include curating geospatial intelligence data for executive customers, managing development processes, and providing training. King also has 10 years of experience in the US Navy, where he served as a science officer providing environmental analysis and briefings to military leaders. He holds an MS in Physics and a BS in Biology, and has received numerous military awards for his leadership and analytical skills.
Michael John Siek Jr. has over 20 years of experience conducting intelligence analysis for the Department of Defense and Department of State. He currently works as an Intelligence Specialist for the Joint Warfare Analysis Center, where he performs strategic, operational, and tactical analysis on adversary networks. Previously, he served as an Air Force Special Agent conducting counterintelligence and as a contractor providing threat assessments for the U.S. President's protective detail in Afghanistan. Siek has a background in logistics and supply chain management from his service in the Air Force. He is pursuing a bachelor's degree in intelligence studies while working full time and has received numerous honors and awards over his career.
2012 IWS Corporate Overview Updated 27 Sept 12Randy Lange
This company provides consulting, analysis, and advisory services exclusively to the national security community. It has a cleared professional workforce with extensive experience and advanced degrees. Services include organizational planning, business architecture, technology management, and intelligence processing/data exploitation expertise. Past performance includes projects with the FBI and TSA that improved mission effectiveness, decision-making, operations coordination, technology cost/performance, and financial management for national security missions.
Sandra Brooks is applying for the position of Executive Director for Technology and Innovation. She has over 33 years of experience as a Navy cryptologist, information warfare officer, and intelligence director. Some of her career highlights include establishing the Navy as the executive agent for the Comprehensive National Cybersecurity Initiative, developing the Navy's technology and innovation strategic plan, and establishing collaborative environments to develop and test rapid release technologies. She has a proven track record of discovering, developing, and securing funding for innovative technological solutions.
This document summarizes an individual's experience in intelligence analysis, information operations, and project management. They have a background in intelligence studies and counter-terrorism as well as business management. Relevant experiences include deployments to Afghanistan and Iraq where they performed duties such as developing psychological operations media, coordinating intelligence briefings, and managing information operations platforms. Currently they utilize analytical skills to support counter-IED targeting and hold a TS-SCI clearance.
Gerald Scott Holtzlander has over 23 years of experience in intelligence analysis, cyber analysis, and all-source analysis. He has held positions as a senior intelligence analyst, cyber network analyst, program manager, signals analyst, and intelligence analyst for the Navy and private contractors. He has a Bachelor's degree in Multi-disciplinary Studies and an Associate's degree in Criminal Justice.
Louis B. Ippolito has over 15 years of experience in geospatial analysis, imagery analysis, and intelligence analysis. He holds a TOP SECRET security clearance and has expertise in numerous geospatial and imagery analysis tools. He has worked as a geospatial analyst, imagery analyst, and full motion video analyst for Boeing, the National Geospatial Intelligence Agency, and the Joint Special Operations Task Force in both CONUS and overseas locations such as Afghanistan. His experience includes collecting, analyzing, and disseminating geospatial data and intelligence to support military operations. He also has experience in combat targeting and battle damage assessment.
This document summarizes the experience and qualifications of Stacey L Fournier, an accomplished Geospatial Analyst, GEOINT Author and IT Professional with over 18 years of experience in intelligence analysis, imagery analysis, systems administration, and desktop support. She has extensive experience working with geospatial intelligence and imagery analysis tools. She also has experience creating training programs, standard operating procedures, and providing customer support.
Nicole Nineveh Mitchell has over 9 years of experience in the intelligence field, including positions as a Senior Targeting Analyst, Foreign Disclosure Officer, Counterintelligence Agent, and All Source Intelligence Analyst. She has a track record of performance excellence in managing multiple projects simultaneously. Mitchell has extensive technical proficiency in various intelligence software and strong analytical skills in diverse populations. Her education includes pursuing a Bachelor's degree in Intelligence Operations.
Resume as of 21 October 2015. Program Manager, Project Manager, Product Manager, System Engineering, System Integration, System Final Acceptance Testing for contractual requirements, Leadership
Rodney Puente is seeking to finish his Associate's Degree in GIS at Brookhaven College, where he has taken several GIS courses over the past two years. He has over 11 years of military experience and 3 years of experience working for the TSA. His resume also outlines over 5 years of experience providing technical support for telecommunications services. Puente is proficient in GIS software and has studied topics such as cartography, raster data, and web GIS applications.
Michael Tuggle 2016 Resume_Word_Format_OnlyMichael Tuggle
This resume summarizes the professional experience of Michael J. Tuggle, who has over 25 years of experience as an intelligence analyst supporting counterterrorism operations. He has deployed multiple times to Afghanistan where he served as a lead analyst providing all-source intelligence support. His experience includes analyzing signals, human, geospatial, and open source intelligence. He is proficient in various intelligence analysis tools and his work directly supported targeting and counter-IED efforts.
This article provides insights into the current state of devel.docxrandymartin91030
This article provides insights into the current state of developmenta l
testing (DT) and requirements management in Department of Defense
information systems employing Agile development. The authors describe
the study methodolog y and provide an overview of Agile development and
testing. Insights are described for requirements, detailed planning, test
execution, and reporting. This work articulates best practices related to
DT and requirements management strategies for programs employing
modernized Software Development Life Cycle practices.
DOI: https://doi.org/10.22594/dau.19-819.26.02
Keywords: Development and Operations (DevOps), DoD, Software Development,
Automated Testing, Software Development Life Cycle (SDLC)
D
EF
EN
SE
A
CQ
UISITION UNIVER
SIT
Y
H
IR
SC
H
R
ES
EARCH COMPETIT
IO
N
2019
A
LU M NI A SS O CIA
TI
O
N2nd
DEVELOPMENTAL
TEST and REQUIREMENTS:
Best Practices of Successful
INFORMATION
SYSTEMS
USING AGILE METHODS
Jeremy D. Kramer and Lt Col Torrey J. Wagner, USAF
Image designed by Michael Krukowski
130 131Defense ARJ, April 2019, Vol. 26 No. 2 : 128-150 Defense ARJ, April 2019, Vol. 26 No. 2 : 128-150
Developmental Test and Requirements: Best Practices of Successful Information Systems https://www.dau.mil April 2019
Industry software development efforts have used Agile and development
and operations (DevOps) methodologies over the last 5 to 15 years. The
Department of Defense (DoD) has applied these methodologies to various
information system acquisition programs, and current guidance provides
a renewed interest in pursuing these methodologies. The National Defense
Authorization Act for Fiscal Year 2018 (NDA A, 2017) directs acquisition
Program Ma nagement Off ices (PMO) to pursue Agile or iterative sof t-
ware development by establishing pilot programs to use “Agile or Iterative
Development methods to tailor major software-intensive warfighting sys-
tems and defense business systems” (§ 873) and “Software Development
Pilot Program Using Agile Best Practices” (§ 874). Similarly, the 2018 Air
Force Guidance Memorandum for Rapid Acquisition Activities (A FGM
2018-63-146-01) states that, “Agile software development and [DevOps]
is required for all new initiatives unless waived” (Department of the Air
Force, 2018, p. 9).
Background
This study was motivated by the 2018 NDAA and increased emphasis on
Agile development throughout the DoD; the lead author collected data from
April to September 2018 during a rotational assignment within
the Office of the Deputy Assistant Secretary of Defense for
Developmenta l Test and Eva luation, DASD(DT&E).
The purpose of the study was to collect insights and
best practices from DoD program offices prac-
ticing Agile software development methods,
some of which use the DevOps development
and deployment strategy.
The f ive DoD sof tware-intensive sys-
tems shown below were selected for
this study, as they have been infor-
m a l.
Roger Fronek has over 18 years of experience as an intelligence analyst and foreign disclosure officer for the US Navy, Army, and private contractors. He currently works as a Senior Intelligence Analyst for Perception IR, where he provides intelligence support and analysis. Prior experience includes positions as an intelligence analyst in Afghanistan, the Horn of Africa, and Bahrain, advising on foreign disclosure and developing intelligence briefings. He has extensive experience analyzing information from various sources and delivering presentations to senior leadership.
Rock and metal are popular genres of music. Rock originated in the 1950s and draws influence from blues and country. Metal evolved from rock in the late 1960s and 1970s and features loud, amplified guitars and drums with lyrics often dealing with dark themes.
This document provides a summary of Aaron Thompson's qualifications, experience, and education. Thompson has over 6 years of experience as a signals intelligence analyst for the military, specializing in geospatial analysis, electronic warfare, and computer network analysis. He has deployed to Afghanistan in support of NATO forces and provided tactical intelligence reporting. Thompson is highly skilled in signals intelligence techniques and analysis tools. He holds a Top Secret security clearance and is pursuing an Associate's degree in intelligence operations.
Este documento introduce el tema de higiene y seguridad industrial. Explica que la asignatura cubre los fundamentos básicos y herramientas para prevenir accidentes laborales y enfermedades, así como preservar la salud de los trabajadores. También menciona que se estudiarán la identificación y evaluación de riesgos laborales y sus técnicas de prevención, de acuerdo con las normas legales colombianas.
Neurologists have proven that our thinking, perception and actions are shaped by activity in our brain that occurs outside of conscious awareness or control, this results in unintentional influences that may not align with our values, or the values of your company. We call these unintentional influences "unconscious bias" and they are neither good nor bad. In this interactive workshop, participants will have an experience of how our unconscious mind works, discuss how unconscious patterns impact groups particularly around decision making at work, and put in place strategies and actions that can be taken by each of us to balance conscious intent with unconscious beliefs to build a more inclusive environment.
Janella Campbell is an intelligence analyst with experience conducting all-source analysis and full motion video analysis. She has worked as an intelligence analyst for the Army National Guard and BAE Systems, where she produced reports and briefings. She is seeking a new position where she can use her analytical, research, and technical skills to support intelligence operations.
Dallas T. King III has over 14 years of experience in program analysis, operations planning, and quality assurance for the National Geospatial-Intelligence Agency (NGA). He currently works as a Principal Program Analyst II at NGA, where his responsibilities include curating geospatial intelligence data for executive customers, managing development processes, and providing training. King also has 10 years of experience in the US Navy, where he served as a science officer providing environmental analysis and briefings to military leaders. He holds an MS in Physics and a BS in Biology, and has received numerous military awards for his leadership and analytical skills.
Michael John Siek Jr. has over 20 years of experience conducting intelligence analysis for the Department of Defense and Department of State. He currently works as an Intelligence Specialist for the Joint Warfare Analysis Center, where he performs strategic, operational, and tactical analysis on adversary networks. Previously, he served as an Air Force Special Agent conducting counterintelligence and as a contractor providing threat assessments for the U.S. President's protective detail in Afghanistan. Siek has a background in logistics and supply chain management from his service in the Air Force. He is pursuing a bachelor's degree in intelligence studies while working full time and has received numerous honors and awards over his career.
2012 IWS Corporate Overview Updated 27 Sept 12Randy Lange
This company provides consulting, analysis, and advisory services exclusively to the national security community. It has a cleared professional workforce with extensive experience and advanced degrees. Services include organizational planning, business architecture, technology management, and intelligence processing/data exploitation expertise. Past performance includes projects with the FBI and TSA that improved mission effectiveness, decision-making, operations coordination, technology cost/performance, and financial management for national security missions.
Sandra Brooks is applying for the position of Executive Director for Technology and Innovation. She has over 33 years of experience as a Navy cryptologist, information warfare officer, and intelligence director. Some of her career highlights include establishing the Navy as the executive agent for the Comprehensive National Cybersecurity Initiative, developing the Navy's technology and innovation strategic plan, and establishing collaborative environments to develop and test rapid release technologies. She has a proven track record of discovering, developing, and securing funding for innovative technological solutions.
This document summarizes an individual's experience in intelligence analysis, information operations, and project management. They have a background in intelligence studies and counter-terrorism as well as business management. Relevant experiences include deployments to Afghanistan and Iraq where they performed duties such as developing psychological operations media, coordinating intelligence briefings, and managing information operations platforms. Currently they utilize analytical skills to support counter-IED targeting and hold a TS-SCI clearance.
Gerald Scott Holtzlander has over 23 years of experience in intelligence analysis, cyber analysis, and all-source analysis. He has held positions as a senior intelligence analyst, cyber network analyst, program manager, signals analyst, and intelligence analyst for the Navy and private contractors. He has a Bachelor's degree in Multi-disciplinary Studies and an Associate's degree in Criminal Justice.
Louis B. Ippolito has over 15 years of experience in geospatial analysis, imagery analysis, and intelligence analysis. He holds a TOP SECRET security clearance and has expertise in numerous geospatial and imagery analysis tools. He has worked as a geospatial analyst, imagery analyst, and full motion video analyst for Boeing, the National Geospatial Intelligence Agency, and the Joint Special Operations Task Force in both CONUS and overseas locations such as Afghanistan. His experience includes collecting, analyzing, and disseminating geospatial data and intelligence to support military operations. He also has experience in combat targeting and battle damage assessment.
This document summarizes the experience and qualifications of Stacey L Fournier, an accomplished Geospatial Analyst, GEOINT Author and IT Professional with over 18 years of experience in intelligence analysis, imagery analysis, systems administration, and desktop support. She has extensive experience working with geospatial intelligence and imagery analysis tools. She also has experience creating training programs, standard operating procedures, and providing customer support.
Nicole Nineveh Mitchell has over 9 years of experience in the intelligence field, including positions as a Senior Targeting Analyst, Foreign Disclosure Officer, Counterintelligence Agent, and All Source Intelligence Analyst. She has a track record of performance excellence in managing multiple projects simultaneously. Mitchell has extensive technical proficiency in various intelligence software and strong analytical skills in diverse populations. Her education includes pursuing a Bachelor's degree in Intelligence Operations.
Resume as of 21 October 2015. Program Manager, Project Manager, Product Manager, System Engineering, System Integration, System Final Acceptance Testing for contractual requirements, Leadership
Rodney Puente is seeking to finish his Associate's Degree in GIS at Brookhaven College, where he has taken several GIS courses over the past two years. He has over 11 years of military experience and 3 years of experience working for the TSA. His resume also outlines over 5 years of experience providing technical support for telecommunications services. Puente is proficient in GIS software and has studied topics such as cartography, raster data, and web GIS applications.
Michael Tuggle 2016 Resume_Word_Format_OnlyMichael Tuggle
This resume summarizes the professional experience of Michael J. Tuggle, who has over 25 years of experience as an intelligence analyst supporting counterterrorism operations. He has deployed multiple times to Afghanistan where he served as a lead analyst providing all-source intelligence support. His experience includes analyzing signals, human, geospatial, and open source intelligence. He is proficient in various intelligence analysis tools and his work directly supported targeting and counter-IED efforts.
This article provides insights into the current state of devel.docxrandymartin91030
This article provides insights into the current state of developmenta l
testing (DT) and requirements management in Department of Defense
information systems employing Agile development. The authors describe
the study methodolog y and provide an overview of Agile development and
testing. Insights are described for requirements, detailed planning, test
execution, and reporting. This work articulates best practices related to
DT and requirements management strategies for programs employing
modernized Software Development Life Cycle practices.
DOI: https://doi.org/10.22594/dau.19-819.26.02
Keywords: Development and Operations (DevOps), DoD, Software Development,
Automated Testing, Software Development Life Cycle (SDLC)
D
EF
EN
SE
A
CQ
UISITION UNIVER
SIT
Y
H
IR
SC
H
R
ES
EARCH COMPETIT
IO
N
2019
A
LU M NI A SS O CIA
TI
O
N2nd
DEVELOPMENTAL
TEST and REQUIREMENTS:
Best Practices of Successful
INFORMATION
SYSTEMS
USING AGILE METHODS
Jeremy D. Kramer and Lt Col Torrey J. Wagner, USAF
Image designed by Michael Krukowski
130 131Defense ARJ, April 2019, Vol. 26 No. 2 : 128-150 Defense ARJ, April 2019, Vol. 26 No. 2 : 128-150
Developmental Test and Requirements: Best Practices of Successful Information Systems https://www.dau.mil April 2019
Industry software development efforts have used Agile and development
and operations (DevOps) methodologies over the last 5 to 15 years. The
Department of Defense (DoD) has applied these methodologies to various
information system acquisition programs, and current guidance provides
a renewed interest in pursuing these methodologies. The National Defense
Authorization Act for Fiscal Year 2018 (NDA A, 2017) directs acquisition
Program Ma nagement Off ices (PMO) to pursue Agile or iterative sof t-
ware development by establishing pilot programs to use “Agile or Iterative
Development methods to tailor major software-intensive warfighting sys-
tems and defense business systems” (§ 873) and “Software Development
Pilot Program Using Agile Best Practices” (§ 874). Similarly, the 2018 Air
Force Guidance Memorandum for Rapid Acquisition Activities (A FGM
2018-63-146-01) states that, “Agile software development and [DevOps]
is required for all new initiatives unless waived” (Department of the Air
Force, 2018, p. 9).
Background
This study was motivated by the 2018 NDAA and increased emphasis on
Agile development throughout the DoD; the lead author collected data from
April to September 2018 during a rotational assignment within
the Office of the Deputy Assistant Secretary of Defense for
Developmenta l Test and Eva luation, DASD(DT&E).
The purpose of the study was to collect insights and
best practices from DoD program offices prac-
ticing Agile software development methods,
some of which use the DevOps development
and deployment strategy.
The f ive DoD sof tware-intensive sys-
tems shown below were selected for
this study, as they have been infor-
m a l.
Roger Fronek has over 18 years of experience as an intelligence analyst and foreign disclosure officer for the US Navy, Army, and private contractors. He currently works as a Senior Intelligence Analyst for Perception IR, where he provides intelligence support and analysis. Prior experience includes positions as an intelligence analyst in Afghanistan, the Horn of Africa, and Bahrain, advising on foreign disclosure and developing intelligence briefings. He has extensive experience analyzing information from various sources and delivering presentations to senior leadership.
Travis Gallinger is an experienced full-motion video analyst with over 8 years of service in the United States Marine Corps. He has extensive experience conducting intelligence analysis using tools such as Palantir, Real-Time StreamViewer, and Multi-Screener. Gallinger has analyzed full-motion video, imagery, signals intelligence, and geospatial intelligence to support combat operations. He is proficient in Microsoft Office, imagery analysis techniques, and has a Top Secret security clearance.
Rene M. Melendrez has over eight years of experience in the United States Army as a Geospatial Intelligence Collection Manager and Analyst. He has a broad range of experience working with intelligence collection teams and various intelligence systems. Melendrez is bilingual in English and Spanish, has a TS/SCI security clearance, and is willing to relocate if necessary. His professional experience includes serving as a Geospatial Intelligence Analyst supervisor, Full Spectrum GEOINT Collection Manager, and Geospatial Intelligence Analyst supporting combat operations in Afghanistan.
Rachel Adamick has over 6 years of experience in cyber security and computer networking. She has held positions as a Cyber Training Developer, Cyber Security Intelligence Analyst Trainer and Mentor for the U.S. Navy, Intrusion Set Analyst, and Network Information Exploitation Analyst. Her experience includes developing cyber security training courses, analyzing digital media and networks, and providing expertise to the U.S. Navy and other organizations. She has a high school diploma and military certifications including Net+ and Sec+.
Gregory Gallardo has over 20 years of experience in leadership, technical support, project management, and strategic planning for national agencies such as the VA, FDA, and Army. He has led teams supporting requirements development and documentation for systems like the Army's SCES. Currently an Information Systems Engineer Lead at MITRE, he has also held management positions at AT&T Government Solutions and Northrop Grumman supporting programs at agencies including NGA, DNI, and Navy.
Christopher Andrews is seeking a job in intelligence analysis to research and assess national security threats. He has 9 years of experience in military intelligence, including human intelligence collection and analysis while deployed in Afghanistan and Iraq. His experience includes advising Afghan forces, screening personnel, conducting interrogations, and producing intelligence reports. He holds an Associate's degree and is pursuing a Bachelor's degree in International Relations with a minor in Cybersecurity.
1. Jamal Shakeenab 637 Appomattox Ct. Clarksville, TN 37043 (931) 338-0548
OBJECTIVE: to obtain a full-time position that relates to SIGINT Geospatial Intelligence and/or Digital
Network Intelligence (DNI) that will offer growth, professional development, and personal fulfilment.
SUMMARY: 27 months military and intelligence experience in All-Source CT (C-IED) analysis and Network
Targeting, including SIGINT, GEOINT, and HUMINT, for Intel Support to Special Operations and deployed
Task Force actions toward HVT and insurgent groups.
CLEARANCE: Top Secret/SCI by NSA, NSAAdjudicated Feb 13
CI Polygraph NSA, Dec 13
PROFESSIONAL EXPERIENCE
January 2015 – March 2016. United States Air Force. NSA, S2G6
SIGINT Geospatial Analyst and Reporter (Full Time, 40 hour work week)
Analyzed telecommunication networks in support of counter-terrorism mission-sets, as well as authored
and aided in over 100 SIGINT reports to assist in operations planning and future insurgent network exploitation
opportunities
Performed DNI analysis and collaborated with Intelligence Community partners to maintain accurate
knowledge and technical continuity of targets
Conducted Deep Dive research and daily correlation of terrorist activity, writting articles, papers, and
assessments focused on counter terrorism networks and personalities
Utilized All-Source research (SIGINT, GEOINT, CI/HUMINT, IMINT, OSINT) in order to develop
SIGINT & CT analysis products, cross-check data and products with All-Source intelligence, and used data to
author Serialized reports regarding IED-related activity focused on the Taliban insurgent group and like
insurgent groups within the CENTCOM AOR
Perform Named Area of Interest (NAI) Studies and Pattern of Life Studies analysis for Terrorist Entities,
Violent Extremist Use of Cyber/Media venues; Predictive and Historical analysis to support operations and
planning, and insurgent association techniques
Discovered and maintained target idenifiers through extensive analysis and target following
Analyzed and evaluated data to determine changes in enemy capabilities, vulnerabilities, and security
practices and recommend probable courses of action
Conducted in-depth technical and social network analysis in support of counter-terrorism efforts
Used SIGINT Development (SIGDEV) tools daily to maintain SIGINT awareness of target activities
Maintained extensive knowledge of collection, retention, and reporting policies and procedures
Provided time-sensitive, geolocation analysis in support of on-going military operations
Provided over 50 Operation reports, and presented weekly CT briefs to senior leadership in accessing
Target Intelligence Analysis in support to Counterinsurgency Operations (COIN)
Assisted mission’s development of operational business rules, processes, and workflows
Liaisoned with technical advisors, IT specialists and operators to develop collection strategies and
SIGINT development (SIGDEV) tool construction
Enrolled in analysis/reporting professional development program; ArcGIS super-user for analysis
Supported U.S. reconnaissance missions providing Intelligence and Warning indicators
Prepared responses to requests for information (RFI)/production requests (PR)/formal and informal
taskers for intelligence/information
Performed functions in support of the Command Joint Operations Center24/7 Terrorism Watch.
Accessed, reviewed, correlated, corroborated, analyzed, and maintained a wide variety of All-Source
intelligence reports, finished intelligence products/reports and intelligence/operational data
Provided near term and current Regional/Country geo-political and General Military Intelligence on
regional terrorist organizations, insurgent groups, and related activities within the CENTCOM AOR.
2. January 2014 – December 2014, United States Air Force (Tennessee Air National Guard), 246th IS
Mission InitiationAll-SourceAnalyst (Full time, 40 hour work week)
Designed collection strategies to integrate with, enable DNI, HUMINT, and GEOINT operations
Reviewed customer Intelligence Needs/Collection Requirements to ensure collection goals met
Used reporting databases daily to develop and record target activity for customers and analysts
Integrate SIGINT information directly into daily analysis and reporting operations
Contributed to the production of over 250 intelligence dossiers
Aided in the design, creation and execution of initial mission operation of the 218th Intelligence
Surveillance and Reconnaissance Group
Assisted drafting 120 pages of research and analysis, which lead to a 105% increase in tactical
operations
Applied software tools, like GIS, to research resource allocation for real-time and past-events, to analyze
collection methods, determine collection strategy effectiveness
Researched and analyzed multi-source, multi-agency collection databases for technical reporting,
assessing collection/dissemination
Recognized task, process, exploit,
disseminate (TPED) and author time-sensitive intelligence reports in accordance with established guidelines to
support national decision makers
Produce, analyze, study, research, fuse, and
correlate intelligence for strategic, operational, and technical customers providing Joint Intelligence Preparation
of the Operational Environment (JIPOE)
Prepare target communications
assessments, adversary order of battle studies, situation reports, and other intelligence reports as required
Provide analysis of Information Operations
activities and support to Air and Space Operations Centers and supported commanders
Experience Chronology
Jan 15 – Mar 16. Full Time Orders. SGA.
S2G62/Ft. Meade, MD – 1 Year 3 Months
Jan 14 – Dec 15. Full Time Orders. Mission
Initiation Analyst. 246th IS/ Nashville, TN – 1 Year
Training Courses: Multiple intelligence integration (HUMINT, GEOINT, ELINT, FISINT), Vuport classes
(NETA, CYEC, RPTG, ANSK)
Systems: Geographic Information Systems (GIS) analysis, multiple IC databases (NSA, CIA, DIA, NGIC,
NGA, NRO) & Analytic Modernization (AMOD) Tools
EDUCATION/TRAINING
Associates Degree ~ Intelligence Studies and Technology; Community College of the Air Force; Montgomery,
AL (Mar 2016)
Joint Cyber Analysis Course (JCAC), 316th Training SQ; CID Corry, Pensacola, FL (Sep 2016)
AFSC: SIGINT Analyst Technical Training, 316th Training SQ; Goodfellow AFB, San Angelo, TX (Jan 2014)
Agency Courses
CYEC 2200 – Advanced Adversary Tactics Jan 2016
CYEC 2150 – Computer Network Operations at NSA July 2015
GISA 1022 – Maps and Geo-coordinate Systems July 2015
RPTG 2012 – Basics of SIGINT Dissemination June 2015
3. NETA 2108 – Converged Analysis Tradecraft Boot camp May 2015
ANSK 3101 – Intelligence Analysis Principles Apr 2015
NETA 2014 – RT-RG Tool Suite for GSM Analysis Mar 2015
Intelligence Tools and Software Applications: SIGDEV, ArcGIS, ArcView, ArcMap, Google Earth, Intelink,
Intellipedia, Analyst Notebook, Wireshark, Kali Linux CLI Tools, Microsoft Office Suite, Adobe, Web
Browsers (Chrome, Mozilla, EDGE), Operating System (Windows OS, Mac OS, and Linux)
Intelligence and Operations Systems and Networks: NIPR, SIPR, Joint World Intelligence Communications
System (JWICS), NSAnet.
AWARDS/ACHIEVEMENTS
U.S. Air Force Achievement Medal 2016
Joint Service Achievement Medal 2016
Global War on Terrorism Medal 2014
Professional Development Medal 2014
Airman of the Quarter 2014
Honor Graduate (Basic Training) 2013
Pre-Publication Review number (DJ2-2016-02669)