ABOUT ME

Hi, I'm Jared Elijah Pisacreta, Cybersecurity Analyst, IT Engineer, Threat Hunter, DFIR Analyst, and general tech Swiss Army Knife. I am a results-driven cybersecurity professional with eight years of experience strengthening organizational security and optimizing operations through advanced information systems and risk management strategies. As a dynamic leader and collaborator, I excel in forensic investigations, strategic cybersecurity planning, and securing both on-premises and cloud environments. My expertise spans risk assessment, incident response, and regulatory compliance, ensuring organizations maintain a strong security posture. Passionate about mentorship and team development, I foster a culture of continuous learning and improvement. I stay ahead of emerging threats and technologies, bringing a problem-solving mindset and a commitment to driving impactful security solutions. .



I built this static website in Microsoft Azure as part of my portfolio.

Certifications

GIAC Certified Forensic Analyst

November 2023

CompTIA Security+

March 2022

CompTIA CySA+

December 2023

CompTIA Linux+

September 2019

Education

University of Maryland Global Campus

Bachelor of Science in Computer Networks and Cybersecurity September 2021 - March 2025

Work

Defensive Cyber Operations Analyst, US Navy (Cyber National Mission Force) | Fort Meade, MD

Senior Host Forensics Lead and Threat Hunter Apr 2018 - Present

  • Delivered technical briefings to executive leadership and collaborated with stakeholders to navigate complex security landscapes, enhancing network visibility and strengthening overall security posture.
  • Managed a team of digital forensic investigators within a National Cyber Protection Team, directing complex investigations, evidence collection, and cyber incident analysis to strengthen national cybersecurity and improve incident response capabilities.
  • Performed proactive threat hunting to detect and analyze emerging adversarial Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs), producing technical reports with actionable insights to enhance threat detection and strengthen cybersecurity defenses.
  • Designed and led advanced cybersecurity training programs, enhancing threat detection and response capabilities to improve team proficiency and operational readiness for cyber warfare scenarios.

Navy Federal Credit Union | Vienna, VA (Remote/Part-time)

Security Operations Center Analyst (Contractor) Apr 2022 - Present

  • Analyze Identity and Access Management (IAM) telemetry from multiple sources, including Microsoft Entra ID (Azure AD) and Microsoft 365 (O365), to investigate alerts related to account compromise, phishing, and email activity, enabling rapid threat identification and response to protect critical business resources in an Azure environment.
  • Coordinate with internal security and IT teams to escalate urgent issues, ensuring rapid containment and remediation of threats within an Azure-based environment.
  • Perform continuous monitoring of a dynamic network environment, analyzing traffic for malicious activity, providing real-time cybersecurity support for a critical financial network.
  • Leverage expertise in Windows and Linux operating systems with a strong focus on Azure security controls, integrating tools such as Microsoft Defender for Identity and Azure Security Center.
  • Utilize EDR platforms (Microsoft Defender for Endpoint) and SIEM solutions (Microsoft Sentinel, Splunk) to identify, analyze, and report threats, enhancing security visibility and response across an enterprise network.