Adam Sinsel C-CISO I CISSP I CEH I CNDA
Details
● Directed MITRE engagement on DOD Zero Trust Cybersecurity Validation of DOD cloud Software as a Service (SaaS) environments and Mobile and BYOD cybersecurity testing. Designed and executed purple team threat assessment and ZT validation on 16 Microsoft M365 Cloud Environments in 18 months, identifying hundreds of risks and vulnerabilities, resulting in a significant increase in cyber resiliency of DOD networks.
● Key member of cross-functional team in DEVSECOPS and agile development of the Federated MS O365 cloud environment, providing security recommendations for the DOD minimally viable product. Aided continuous improvement through recommendations in the areas of threat analytics, detection and response, automation, and process improvement.
● Assessed automated detection and response of managed service providers for cybersecurity, in endpoint detection and response (EDR), and intelligent automation tools Microsoft Power Automate and Azure Information Protection (AIP).
● Engaged with senior executives in strategic planning to align work plan to sponsor strategy.
● Conducts quality assurance of technical deliverables per fiscal year by practicing a disciplined approach to MITRE’s corporate quality review process
● Creative and equitable problem solving, identifying and obtaining win-win solutions, bolstering client trust of MITRE client services, and increasing client demand for MITRE support.
● Increased size of MITRE project for DOT&E by approximately 10% while other projects in the same portfolio were experiencing reductions in funding and tasking.
● Contract development activities such as Performance Work Statements, Sole-Source Justification Letters, and proposal development for emerging tasks.
2020 : Present
MITRE
Principal Cybersecurity Engineer & Project Lead
• Currently working in the Undergraduate School at UMUC, teaching cybersecurity related college courses on military bases and online.
• Classes taught include : #CEH and #CISSP preparation courses, as well as Interconnecting #Cisco Devices.
2016 :
University of Maryland University College
Adjunct Assistant Professor - Cybersecurity
• Educates Officers, Senior Enlisted personnel, and senior Government Civilians in Joint Command, Control, Communications, Computers and Intelligence (C4I), Cyber Staff and Operation (JC4ICSOC).
• Teaches DoD Cyber 101 and Basics of Offensive Cyber Operations (OCO)
2019 :
Joint Forces Staff College, National Defense University
Guest Lecturer - Joint Cyber Course
• Generated cybersecurity test plans for Navy surface combat systems, directed test events, performed analysis, authored reports, and presented findings to enable the Navy’s assessment of technical performance, specification compliance, and system maturity to inform decisions regarding effectiveness, suitability, and survivability of systems.
• Cyber Table Top Red Team and cyber Opposing Force (OPFOR) subject matter expert in support of the US Navy’s next generation frigate – FFG(X). Planned realistic Red Team injects, identifying and resolving potential cyber vulnerabilities early in developmental testing, reducing post-delivery hardening costs and increasing overall platform security.
2018 : 2020
US Navy
Cybersecurity Test & Evaluation Director
• Lead a high-performing team of 15 security professionals who portray a sophisticated Cyber Opposing Force (OPFOR) and provide Cyber Threat Emulation (CTE) to support Department of Defense and Navy training and assessment objectives during ten major exercises at three Geographic Combatant Commands.
• Planned and executed Red Team operations and vulnerability assessments in support of Combatant Commander and Optimized Fleet Response Plan (O-FRP) exercises.
• Trusted to coordinate and direct all Navy Red Team support for Office of the Secretary of Defense, Director, Operational Test and Evaluation (DOT&E) Cybersecurity Assessment Program (CAP).
• Planned and executed social engineering (SE) penetration attacks against DoD units as part of Close Access Team (CAT) efforts. Expert at crafting and conducting vishing, phishing, and impersonation SE attacks. Helped large organizations raise awareness to protect against social engineering attacks.
• Trained 40 Navy Red Team's social engineering operators in vishing, phishing, and impersonation.
• Served as cyber systems operations Subject Matter Expert (SME) in Cyber Working Groups to develop training objectives and integrate cyber effects into the schedule of events and help create synergy between cyber cell and kinetic warfare areas.
• Expert communicator - verbally and in writing. Routinely responsible for briefing executives regarding mission planning, execution, and outcomes. Conveyed highly technical information to a variety of audiences in a properly distilled and accessible manner.
• Experienced formal writer - authored Concept of Operations (CONOP) documents, cross-departmental Memorandums of Agreement/Understanding, personnel counseling and evaluations, mission nomination packages, and in-depth technical assessment and vulnerability reports. Written products require zero rework and communicate critical information--with the appropriate detail--for senior executive and technical personnel alike.
2016 : 2018
US Navy
Navy Red Team- Cyber Threat Emulation (CTE) Lead
About
Cyber risk professional and trusted consultant to leaders in the Department of Defense (DOD) for over 24 years. Proven leadership and expertise in planning, executing and leading teams in network operations, including technical security assessments in the areas of red team, blue team, cyber security test and evaluation, GRC compliance, cyber hygiene, and full-spectrum penetration testing. Uniquely capable of leading Cyber Threat Emulation against a wide range of technologies and diverse environments in support of organizational strategic goals. Specialized experience in network and personnel security, incident response, vulnerability and threat management, and operational planning. Possessing excellent communication skill in written and spoken mediums, adept at building relationships, determining requirements, and advancing balanced risk management recommendations. Demonstrates superior quality management in either collaboration or individual contributor scenarios. Seeking meaningful and professional human interactions! (read: I'm happy to help others, and Lord knows I'll need some help along the way.)
★Experienced cybersecurity professional and exceptional field-grade Naval Officer:
Focus areas of Cyber Systems Operations (cyber wargaming, vulnerability assessment, penetration testing, and red teaming ). CISSP since 2011, Certified Ethical Hacker (CEH), LPIC-1, LINUX+, ITIL V3 Foundation, C|CISO
★ Specialties:
Threat Modeling • Red Team Operations • Penetration Testing • Advanced Persistent Threats • Social Engineering • Blue Team Operations • Technical Assessment • Operational Test & Evaluation • Cyber Hygiene & Awareness • Business Continuity • Crisis Management • Critical Thinking • Risk Management • Team Leadership • Verbal and Written Communication • Complex Problem Solving • Planning • Adaptability • TS/SCI
★ Gifted educator:
• Adjunct faculty @ UMUC; specializing in prep courses for #CISSP and #CEH
• Guest Lecturer, Joint Cyber Course - Joint Forces Staff College
• Social Engineering operator training to Red Team members
• Social Engineering awareness training for large organizations (phishing,vishing, impersonation)
• Certified Master Training Specialist (USN)
★ Talented Writer:
Published in Proceedings Magazine, Navy Times, CHIPS Magazine, Info Domain Magazine, and Bleacher Report.com. Known to bloviate on topics like Cybersecurity, National Defense, Politics, History, Country Music, Mountaineer Football, and the Auction Industry.