Kelly Doyle
Global Cyberlympics, Preliminary World Finals, 2nd Place of more than 2,000 teams.
Secure Ninja Hacking Range, Individual Competition, 4th Place with 1,500+ participants.
Masters of Science
Information Assurance
Masters of Science
Technology Management
Bachelors of Science
Computer Security
Bachelors of Science
Information Systems
Industry Certifications
Security Expertise
Red Teaming
Penetration Testing
Offensive Cyber Operations
Malware Analysis
Vulnerability Management
Computer Forensics
SOC Operations
Incident Response
Incident Detection
Cloud Security
IT Program Management
Information Assurance
Threat Hunting
Technical Counter Intelligence
Artificial Intelligence
As a seasoned cybersecurity professional with over 23 years in the industry, I currently serve as an R&D Wireless Security SME, Penetration Tester & Vulnerability Researcher at IT Veterans. My expertise spans across multiple security operation centers within the DoD, DoJ, and DHS, where I've been instrumental in building offensive security capabilities. I've successfully launched and managed startups focused on advanced offensive security R&D and cyber security application development with machine learning.
I'm a combat veteran who served with the U.S. Army in support of Operation Iraqi Freedom. I hold a BS in Information Systems and Security, an MS in Information Systems and Technology Management, and I'm pursuing a PhD in Information Technology at George Mason University. In my spare time, I actively participate in computer security and hacking competitions, placing 2nd in the world preliminary finals at the Cyberlympics team event and 4th in the individual hacking competition at Hacker Halted.
My core qualifications include penetration testing, network defense, incident response, forensics, and a strong foundation in various operating systems, networking, and programming languages. I hold over 21 industry-recognized certifications, such as CISSP, ECSA, GCFA, LPT, and CPT. My publications in magazines like eForensics and Hackin9 showcase my thought leadership and technical expertise. I've held key positions at organizations such as Shutterfly LLC, Robin Healthcare, IT Veterans, Spry Methods, Secure Mission Solutions, and CGI Federal.
I continue to focus on cybersecurity research at George Mason University, I remain committed to pushing the boundaries of offensive security and contributing to the advancement of the field.
Professional Timeline
2024-Present
Cyber Security Consultant
A JCIP technical expert conducts rigorous cybersecurity inspections, identifies vulnerabilities and threats, provides guidance to improve security posture, collaborates on remediation strategies, and stays current with the latest trends and technologies to ensure effective inspection processes.2021-2024
Pincipal Security Architect
Designed and implemented secure, resilient, and compliant cloud infrastructures. Developed robust security architectures, automate security processes, and ensure the protection of critical assets in cloud environments.2020-2021
Pincipal Security Architect
Developed comprehensive cybersecurity program, including information assurance, security operations center, risk management, and data analytics, to enhance organizational security posture.2015-2020
Lead Security Architect, Offensive Security Researcher
Led secure wireless architecture deployment and performed custom protocol analysis and penetration testing for AI-driven virtual network routing technology. Implemented integration lab for vulnerability testing on secure mobility technologies, shaping Defense Intelligence Agency solutions and IC policy. Authored first white paper on nation-state capabilities for "Activity-Based Intelligence Collection" using Wi-Fi and Bluetooth. Conducted advanced testing on custom protocols and hardware, uncovering vulnerabilities. Analyzed triple-layer wireless encryption, remediating throughput issues and security vulnerabilities. Discovered and remediated processor-level vulnerabilities in bare metal hypervisor solution affecting IC and DoD.2015
Red & Blue Teams Lead, Technical SME, Program Manager
Built and led a team of 140+ technical staff, ensuring appropriate skills and alignment with business objectives. Managed within budget, increasing customer satisfaction and reducing turnover. Ensured equipment and software compliance with regulations. Coordinated internal and external teams, communicating progress to stakeholders.2011-2015
Senior Penetration Tester, Vulnerability Researcher, Deputy Program Manager
Reduced malware compromise rate by 98.5% over 2 years through advanced analysis techniques. Developed procedures that decreased testing downtime by 300% and increased testing productivity by 3 times. Performed over 30 penetration tests and developed innovative hunt procedures. Reduced annual expenses by 30%. Served as deputy program manager for projects valued over $50 million. Developed threat analysis application, increasing revenue by $1.1 million annually. Developed incident response playbook, reducing response time by 50%. Assisted in security control solution selection, saving an estimated $400,000 per year.2011-2012
CGI Red Team Lead, Senior Cyber Engineer, Penetration Tester
Conducted penetration tests, security assessments, and audits for the USMC as a Marine Corps Information Assurance Red Team operator and technical team lead. Exploited vulnerabilities and leveraged misconfigurations to enhance network security. Disrupted, denied, and degraded information and networks in exercise and operational environments.2009-2011
Senior Technical Combat Developer to Special Programs
Served as a Combat Developer and technical expert for special offensive cyber programs. Managed capability development, target acquisition, and requirements processing. Served as an offensive cyber operator on Operation Olympic Games.1999 - 2009
Air Crew Member - Joint Surveillance Target Attack Radar System (JSTARS)
Performed mission functions as an aircrew member aboard the E-8C Joint Surveillance Target Attack Radar System, or Joint STARS, an airborne battle management, command and control, intelligence, surveillance and reconnaissance platform