Home » Unveiling the Hidden Advantages: My Journey from U.S. Intelligence to Cybersecurity Leadership
Unveiling the Hidden Advantages: My Journey from U.S. Intelligence to Cybersecurity Leadership
Introduction
Cybersecurity is a complex and evolving field that demands a mix of technical, analytical, and interpersonal skills. As the founder of Jadex Strategic Group, I leverage my experience in the U.S. Intelligence Community to enhance our cybersecurity, compliance, and technology services. In this blog, I’ll discuss how my roles as a Cryptologic Technician, analyst, instructor, DoD contractor, and Intelligence Specialist for the U.S. Army Corps of Engineers have given our firm distinct advantages in these sectors.
Lasting Impressions
Growing up in rural Michigan, I admired the brave men in my family who served in the military. My grandfather’s role as a sailor on the USS Wasp inspired my father to become an Aviation Technician in the Navy. Additionally, my Abuelo, a Marine and survivor of the battle of the Chosin Reservoir during the Korean War, motivated my uncle to enlist in the Marine Corps.
Initially uncertain about joining the military, I had even attended college orientation at Saginaw Valley State University before seeking advice from my dad about enlisting in the Navy. He recommended that I first research the available jobs which are called “rates” in the US Navy and then speak with a detailer at MEPS. Many sailors I’ve encountered wish they had received this guidance earlier, as the phrase “Choose your rate, choose your fate” is well-recognized in the US Navy.
I held my father in high regard. After four years of active duty, he continued serving in the Navy reserves. I remember him waking up early to polish his shoes and iron his uniform for inspections before drill weekends or his annual two weeks of active duty. These sacrifices left a lasting impact on me, and my father’s example influenced me the most.
How these Impressions Impact Our Services
The lasting impact and guidance from my father and extended family are central to the foundation of Jadex Strategic Group. To honor those who came before me, I am dedicated to advocating for and safeguarding those in need. Our mission is to serve and protect any organization or business that upholds the principles of freedom and democracy.
Maritime Intelligence Operations
In the U.S. Navy, enlisting requires attending bootcamp followed by “A” school training for your primary role within the fleet. I joined the Navy during a pivotal transition from analog to digital signal acquisition, which was invaluable. This shift enabled me to understand both longstanding methodologies and new opportunities presented by digital technology. For example, I learned traditional signal decryption using ciphers as well as modern techniques involving digital receivers and oscilloscopes.
Following “A” school, my career as a young Cryptologic Technician aboard the USS Chosin in Pearl Harbor, HI, exposed me to a constantly evolving and dynamic environment, especially while at sea. Cryptologic Technicians are not permitted to collect data while in port or allied nations’ ports.
Before a ship sets out on deployment, transitioning from Hawaii to the Middle East, it must undergo a series of rigorous tests and certifications. These ensure the ship, and its crew are fully prepared for the tour of duty. This process involves achieving key milestones, passing inspections, and obtaining necessary certifications, such as the INSURV (Board of Inspection and Survey).
For a Cryptologic Technician like me, this preparation was crucial. Our collection operations were restricted to sea, specifically international waters, as we were prohibited from performing our duties in port. This unique aspect of our role meant that we were highly engaged in extensive training and simulations outside of port.
We frequently traveled from Hawaii to San Diego, where we participated in simulations alongside other members of our battle group. These training scenarios mimicked the operational environment we would encounter at sea, providing invaluable, realistic experience. These simulations were pivotal in my career, as they reinforced the application of our training in real-world situations, thereby enhancing our readiness and effectiveness during actual deployments.
One of the proudest achievements of my naval career was earning the Enlisted Surface Warfare Specialist (ESWS) designation aboard the USS Chosin (CG-65). This prestigious designation is awarded to sailors who demonstrate exceptional proficiency in ship-specific knowledge and maritime warfare skills. Achieving the ESWS pin involved rigorous training, comprehensive exams, and practical demonstrations of expertise across various shipboard operations. Statistics show that only a small percentage of sailors earn this qualification, underscoring its significance and the level of dedication required. Attaining the ESWS pin was a testament to my commitment to excellence and thorough understanding of the complexities of surface warfare.
As I advanced in rank, I became one of our division’s Watch Center Supervisors, overseeing operations within our Ship’s Signal Exploitation Space (SSES). This role involved supervising a watch team, handling classified information, and reporting significant events warranting our attention.
Parallels Between Maritime Intelligence & Cybersecurity Operations
Modern incident response in cybersecurity and maritime SIGINT collection operations onboard a US Navy Cruiser share striking similarities in their core functions and operational dynamics. Both environments are tasked with the continuous monitoring, identification, and reporting of potential threats. In the maritime setting, advanced collection systems are employed to auto-identify and report significant events, ensuring the safety and security of naval assets. Similarly, incident response teams utilize various technologies and methodologies to detect and respond to cyber threats, safeguarding digital infrastructure. Both roles require an elevated level of vigilance, expertise in handling sophisticated equipment, and the ability to make swift, informed decisions under pressure. The experience of managing maritime intelligence operations seamlessly translates to cybersecurity, where the principles of information dominance and real-time threat assessment are equally critical.
Handling classified information in a maritime intelligence environment requires strict adherence to security protocols and meticulous attention to detail, ensuring that sensitive data does not fall into the wrong hands. This parallels the handling of Personally Identifiable Information (PII) and Controlled Unclassified Information (CUI) in the cybersecurity and defense contracting sectors. Both require robust systems for data protection, rigorous access controls, and comprehensive training for personnel to prevent breaches and ensure compliance with legal and regulatory requirements. The vigilance and procedural discipline ingrained in handling classified information in the Navy are directly applicable to managing sensitive information in civilian cybersecurity roles, highlighting the transferable nature of these critical skills.
Moreover, the simulated signals intelligence collection scenarios that were part of my naval training are akin to the real-world training exercises we offer at Jadex Strategic Group. These simulations encompass sensitive information handling and phishing email scenarios, providing our clients with hands-on experience in identifying and mitigating cybersecurity threats. Just as in the Navy, where simulated scenarios prepared us for the complexities of actual deployments, the training at Jadex equips clients with the practical skills necessary to navigate and counter real-world cyber threats effectively. This immersive approach ensures that our clients are not only theoretically proficient but also adept at applying their knowledge in dynamic, high-pressure situations.
The Center for Information Dominance
My role as a Watch Supervisor at sea, handling an advanced collection system for automatic identification and reporting, equipped me to undertake the position of a “C” school instructor at the Center for Information Dominance in Pensacola, FL. In the U.S. Navy, “C” schools provide sailors with advanced, specialized training in technical or operational skills relevant to their job specialties. These programs are designed to deepen a sailor’s expertise and prepare them for more complex responsibilities in their fields.
As an instructor, you were expected to be intimately familiar with your course material. Initially, you rely heavily on the instructor guide, adhering closely to it. However, as you gain proficiency, you can set aside the guide and introduce more of your personality into the lessons. The course I taught combined theoretical knowledge with practical lab instruction. Before taking up this position, I had no idea I would enjoy teaching so much. I found great satisfaction in turning complex concepts into something comprehensible for students. Seeing the moment of understanding, when a student makes a connection to the information I am imparting, is incredibly rewarding.
Early into my tenure at the schoolhouse, my superiors emphasized the importance of earning my Master Training Specialist certification. This designation in the United States Navy signifies an elevated level of instructional proficiency and expertise. It involves demonstrating advanced knowledge of course material, exceptional teaching skills, and the ability to mentor and develop other instructors. I pursued and achieved this certification, which stands not only as a personal achievement but also as a testament to one’s commitment to improving Navy training programs and ensuring the mission readiness of the fleet.
Parallels and Advantages in Cybersecurity
My tenure as an instructor provided invaluable insights and skills that seamlessly translate into the realm of cybersecurity, directly benefiting our firm. Just as in teaching, where simplifying complex concepts is crucial, cybersecurity demands the ability to break down intricate threat landscapes into actionable intelligence. This ensures our team can swiftly and effectively address potential vulnerabilities. The patience and clear communication required to guide students through advanced technical material mirrors the skills needed to navigate and mitigate sophisticated cyber threats efficiently. This enhances our firm’s ability to train and develop top-tier cybersecurity professionals.
Moreover, my experience in creating courses, developing training materials, and providing on-the-job training is invaluable to our firm. These skills ensure that we can effectively impart crucial cybersecurity concepts to our clients, helping them to understand and implement robust security measures.
Leveraging Teaching in Defense Contracting
Towards the latter part of my tenure as an instructor at the schoolhouse, I was contemplating my future career, whether to make a long-term commitment to the Navy or to explore opportunities beyond it. During my time at the schoolhouse, I interacted regularly with various contractors who supported military operations. I recall a colleague working for a major department of defense contractor who provided me with valuable advice and guidance regarding distinct roles outside the Navy. My first job after leaving the Navy was in Colorado, where I took on a position as an instructor for SIGINT systems. Initially, I believed this role would involve utilizing my previous experience as an instructor.
However, I soon realized the contract’s training component was to start in the program’s later phases (around 3 or 4). Therefore, the immediate focus was on establishing the program from scratch, which required developing everything from instructor guides to maintenance manuals. This task involved collaborating with every team connected to the program—from software testers and coders to the identification and validation teams, as well as equipment operators. My responsibility was to meet all these professionals, gather information, take notes, and create comprehensive maintenance manuals and instructor guides complete with screenshots and annotations.
After about a year of extensively working with Microsoft Word and learning its formatting nuances, I became burnt out. This led to my decision to move on before I even had the chance to teach the content formally. This role served as a steppingstone for me to advance to the next opportunity in my career.
Mastery of Documentation and Regulatory Compliance
My extensive experience with Microsoft Word formatting, coupled with the ability to gather and synthesize disparate data sources, provides Jadex Strategic Group with a distinct advantage in creating rigorous and compliant documentation. In my previous roles, I honed the skills necessary to develop comprehensive manuals and guides, ensuring that each document was meticulously formatted to meet the highest standards. This attention to detail is crucial when dealing with regulatory requirements, where precision and clarity are paramount.
By leveraging these skills, our firm can produce thorough and precise documentation for our clients, helping them navigate the often-complex landscape of cybersecurity regulations. Our ability to create well-organized and easily understandable documents ensures that clients can implement necessary security measures with confidence. This not only aids in achieving compliance but also enhances our reputation as a reliable and detail-oriented cybersecurity firm. Consequently, our clients benefit from reduced risks and improved security postures, reinforcing the value we provide in safeguarding their operations.
Fed Nodes Training Team
Following my tenure as a SIGINT instructor in Colorado, I accepted a role with a small defense contractor working for the Counter-IED Operations Integration Center (COIC). During this time, news frequently reported improvised explosive devices (IEDs) detonating in Afghanistan and Iraq. U.S. forces were heavily involved in overseas operations, prompting the establishment of the COIC to address this threat.
I was part of an eight-member team composed of professionals from various intelligence disciplines. For instance, I represented the U.S. Navy as a SIGINT expert, while another member was a HUMINT operator from the Marine Corps. The objective was to gather a diverse group with different skills and expertise from our respective services, forming a fusion team capable of integrating these talents into valuable outputs for our end-users. Our clients included special forces or intelligence sites worldwide.
If you recall the events of 9/11 and were in the United States at the time, media reports suggested that various agencies held pieces of information that could have prevented the attacks. This underscored the need within the intelligence community to find ways to safely share information between agencies while preserving the requirement for sensitive compartmented information. Numerous initiatives were launched to fulfill these goals. My role at the COIC, particularly with the Fed Nodes training team, was part of one such initiative. We utilized a suite of software tools, some internally developed and others commercially sourced.
Our team’s duty was to follow the Implementation team after they had installed and configured the site’s hardware and software. We conducted preliminary training assessments before arriving onsite and discussed objectives and specifics with the site’s military leadership. These assessments allowed us to deliver customized training tailored to each organization’s goals for the technology solutions.
Integrating Intelligence Disciplines in Cybersecurity
The experience gained as part of the Fed Nodes training team at the Counter-IED Operations Integration Center (COIC) has significant parallels to the needs and capabilities required in the cybersecurity field. Just as the diverse team at COIC integrated various intelligence disciplines to address the threat of IEDs, modern cybersecurity efforts require a multidisciplinary approach to effectively safeguard against complex threats.
In cybersecurity, the fusion of different expertise—be it network security, threat intelligence, or incident response—mirrors the collaborative environment of the COIC. Each discipline contributes unique insights that, when combined, lead to a comprehensive understanding of the threat landscape. Just as SIGINT, HUMINT, and other intelligence disciplines were vital to COIC’s mission, the integration of various cybersecurity specialties ensures robust protection mechanisms are in place.
Moreover, the emphasis on information sharing within the COIC is directly applicable to cybersecurity. Effective cybersecurity relies on timely and accurate dissemination of intelligence to relevant stakeholders. This not only enhances situational awareness but also enables swift and coordinated responses to emerging threats. The practice of conducting preliminary assessments and customizing training to meet specific organizational goals at COIC underscores the importance of tailored solutions in cybersecurity. Each organization faces unique challenges and requires a bespoke approach to security training and implementation.
The lessons learned from the COIC experience—such as the value of diverse expertise, the necessity of seamless information sharing, and the importance of tailored training—are directly transferrable to the field of cybersecurity. By adopting these principles, Jadex Strategic Group can enhance its capabilities and provide superior cybersecurity services to its clients, ensuring they are well-equipped to navigate and mitigate the ever-evolving threat landscape.
Global Contingency Operations
I genuinely found my work on the Fed Nodes training team to be both fulfilling and rewarding; nevertheless, our team was consistently understaffed. Consequently, those of us on the team had to travel more frequently than initially expected, leading to a demanding schedule that quickly became exhausting.
Thus, when the opportunity arose to join the US Army Corps of Engineers (USACE) as an Intelligence Specialist working as a government civilian, I seized it. Before this, my knowledge of the US Army Corps of Engineers was limited to their involvement in constructing Washington, DC and the levees in New Orleans. However, I soon discovered that the Corps now primarily contracts out construction work and serves mainly as project managers within the United States, overseeing various building projects. The mission of the Transatlantic Division was to support global contingency operations worldwide.
As an Intelligence Specialist, my responsibility was to aid the US Army Corps of Engineers in reducing the loss of life, assets, and investments during contingency operations. With a forward-thinking approach, I realized that having comprehensive information would facilitate finding solutions. Initially, it was essential to identify the locations of our project sites and visualize them on a map. I collected numerous spreadsheets containing latitude and longitude coordinates for our projects and imported this data into Google Earth to plot the construction sites. Collaborating with various agencies that had access to imagery, we verified our assets. Alarmingly, we discovered that many sites were not being constructed as specified in the contractual agreements. By working with units in the field, we traced the issue back to the land sale process. On paper, the properties were correctly identified; however, during the actual transactions, the buyers were often given a different plot of land, leading to projects being built in potentially hostile environments.
This laid the foundation for the organization’s first Common Operating Picture where we began adding active reporting from units down range and incorporating other data fields to help ensure the organization had better situational awareness of global contingency operations.
From Construction Sites to Cyberspace: Bridging Contingency Operations with Cybersecurity Strategies
Drawing parallels to the cybersecurity field, this experience underscores the importance of accurate data visualization and situational awareness. Just as the USACE needed a clear, comprehensive picture of their project sites to avoid costly and dangerous mistakes, a cybersecurity firm must maintain an up-to-date, detailed view of its network and systems to preemptively identify and mitigate threats. The lessons learned from managing physical assets and coordinating with multiple agencies in the field can be directly applied to managing digital assets and coordinating with cybersecurity teams. By leveraging these insights, Jadex Strategic Group can provide robust cybersecurity solutions, ensuring the safety and security of digital infrastructures much like how we ensured the safety of physical infrastructures in contingency operations.
Conclusion
Reflecting on my journey from the U.S. Intelligence Community to my current role at Jadex Strategic Group, the skills, experiences, and values I have acquired are the bedrock of our firm’s success. The lessons learned in handling classified information, conducting rigorous training, and managing complex operations have seamlessly translated into our cybersecurity strategies and services. By combining these elements, we offer unparalleled expertise and dedication to our clients, ensuring their security and resilience in an increasingly complex digital landscape.
Thank you for taking the time to read about how my background has shaped the unique advantages we offer at Jadex Strategic Group. I am confident that our commitment to excellence will continue to drive us forward, providing innovative solutions to the challenges that lie ahead.