Profile Image

Clinton Patrick Reel

Lead Security Engineer

OBJECTIVE

CISSP-certified cybersecurity professional with over 8 years of experience in IT system compliance, mitigations, implementation, defense, policy, and incident response. Prior enlisted member of the Air Force who developed an Air Force-leading incident response team, and is now a driving force on a Zero Trust project for a customer of Booz Allen Hamilton. Always searching for new ways to learn new skills and master the security domain in all facets.


EXPERIENCE

February 2024 – Current

Lead Security Engineer — Booz Allen Hamilton

  • Currently leading Zero Trust User initiatives following Department of Defense mandates.
  • Authored several white papers that discuss future objectives at a high- and low-level to showcase future objectives
  • Developed an in-depth roadmap for Zero Trust guidelines for future teams to follow within the department.
  • Briefs senior leadership daily and weekly on project status, roadblocks/obstacles, and needs.
  • Leads a few different projects in response to senior leadership requests.
  • Provide expert-level advice to key stakeholders, including cost-benefit analysis and courses of action.


December 2022 – September 2023

Security Operations Engineer — Epic Games

  • Developed Splunk SIEM and CrowdStrike EDR detections to alert, detect, and mitigate evolving threats.
  • Led threat intelligence team to research SCATTERED SPIDER threat to mitigate risk.
  • Researched “Black Lotus” exploit chain to create roadmap to mitigate threat of vulnerability.
  • Actively participated in twice-weekly cross-department threat hunting syncs to understand current threat landscape and develop mitigations.
  • Frequently developed reports for leadership to create assessment plans to defend over 10,000 machines worldwide.
  • Assembled new modules and targets for KAPE forensics tool to assist in forensic investigations.
  • Led Security Operation Center in several investigations against malware and compromise.
  • Assisted with hiring of incoming SOC members; helped develop their skills and provided operating procedures to complete objectives.

July 2022 – December 2022

Senior Security Engineer — InhabitIQ

  • Led fledgling cybersecurity program for over 20 subsidiaries across AWS, GCP, and Azure.
  • Protected over 3,000 corporate machines across the US from current and advanced threats.
  • Utilized Rapid7 to develop vulnerability reports and develop hunts for critical risks with infrastructure.
  • Ensure PCI compliance was met per CTO mandates.
  • Managed several projects concurrently to update Linux infrastructure to latest versions while maintaining customer satisfaction.

February 2022 – June 2022

Information Systems Security Officer (Intern) — Scientific Research Corporation

  • Worked with US Navy intelligence programs on policy development, implementation, and technical assistance.
  • Enhanced security posture for major government cybersecurity inspections.
  • Led the mitigation of several CAT I vulnerabilities across two enclaves.

September 2020 – February 2022

Incident Response Team Manager — United States Air Force

  • Led the coordination of 13 partners across the world to develop Air Force incident response team guidance and implementation.
  • Authored military doctrine, policies, and procedures on incident response plans, utilized by several bases across the world.
  • Mentored over 12 other aspiring cybersecurity professionals on career progression and pathways.
  • Coordinated several visits from fledgling organizations to assist in developmental plans.

December 2018 – September 2020

Incident Response Technician — United States Air Force

  • Assisted with development and creation of organization’s new incident response team and deployed a sophisticated intrusion detection system.
  • Mastered IDS platform to provide high level assistance to other teams and to develop implementation plans to monitor network
  • Created dozens of Suricata and Zeek rules for hunting unknown traffic and utilized Moloch/Arkime for deep-packet analysis.
  • Regularly utilized Wireshark, TCPDump, and other tools for anomalous traffic analysis and triage.

July 2016 – December 2018

Vulnerability Management Technician — United States Air Force

  • Maintained over 20 Windows Servers (2012 R2 and 2016) and provided high-level customer support during outages.
  • Mastered Windows PowerShell to automate help desk tasks and develop programs to enhance the quality of life for users.
  • Led Windows 10 deployment plans; organized upgrade of over 5,000 machines within 3 months.
  • Led monthly syncs to hand-off knowledge and skills to other team members.
  • Mastered STIG program and mentored new co-workers on processes and procedures.