Kaylee E. Gurak
Kaylee E. Gurak
Catonsville, MD • (707) 628-7526 • kaygurak@gmail.com • Linkedin.com/in/Kaylee-Gurak
SENIOR MANAGER, CYBER THREAT INTELLIGENCE
Offensive Cyber Operations | Program Management | Business Development | Network Security
Resourceful and dynamic executive with hands-on experience leading and conducting thorough investigations into cyber-enabled fraud, cybercrime, and advanced persistent threats. Exceptional talent for hearing and identifying client pain points and synchronizing those with organizational goals and objectives. Demonstrated success in enhancing organizational resilience through the proactive identification of vulnerabilities and the implementation of effective countermeasures. Excellent collaborator; demonstrated history of managing intelligence products with multiple agencies in the intelligence community. Instrumental in conceptualizing and executing project vision while achieving complex milestones and adapting to changes. Mastery in transforming business requirements into scalable technology solutions for corporations. Recognized for translating and delivering communications between internal and external stakeholders at all levels for both technical and non-technical audiences. Respected and supportive servant-leader who understands how to identify and retain exceptional talent.
Computer Network Architecture
Project Management
All-Source Intelligence
Solution Selling
Business Planning
War Gaming/Tabletop Exercises
Customer Satisfaction
Cyber-Threat Landscape
Information Assurance
Technical Skills: Linux, CentOS, Ubuntu, Red Hat, Windows 8/10, Cisco, Juniper, JIRA, Confluence, TCP/IP, IDS/IPS, SIGINT, OSINT, GEOINT, Firewalls, Routers
“Kaylee has demonstrated a level of adaptiveness and flexibility only top-tier talent possess. Before she has even been cleared, we have had some unexpected departures that have allowed Kaylee to transition into one of our highest technical roles. She demonstrates a level of eagerness that is contagious. I have no doubt she is going to make significant contributions to the mission and strengthen our reputation with the Government.” -Martin H., Director of Program Management, SAIC
Career Highlights
Ensured the most efficient use of funding and enabled mission-critical travel while reviewing and approving 108 travel authorizations totaling $1M.
Managed onboarding of 246 sailors by managing 12 department sponsorship programs and writing new Standard Operating Procedures for the entire program.
Led comprehensive physical security operations within the CNO Hawaii department involving conducting audits of security logs, rectifying violations, and coordinating monthly meetings among security managers to maintain uniform security controls.
Operated Sexual Assault Prevention and response hotline during after-hours on 15 occasions while serving as a designated advocate for two sexual assault victims, including conducting awareness at booth and delivering training on the program to 125 personnel.
Professional Experience
Huntington Ingalls Industries
2024 To 2024: Cybersecurity SME, Ft Mead, MD (Same customer as previous position)
Served as a technical expert in support of USCYBERCOM mission objectives by developing and maintaining infrastructure and capabilities required to execute operations. Performed tool testing and certification, and developed automation of operational processes to increase productivity and ensure operational security. Led training for the department, providing expertise in JQS writing and course development.
Fulfilled testing requirements of 14 tools/capabilities required to perform mission, authoring reports and submitting them for operational approval.
Successfully completed customer transition from legacy USCYBERCOM infrastructure to the new required infrastructure prior to deadline, allowing for zero mission interruptions.
Managed JIRA and Confluence ticketing system to ensure timely processing of requests for approval of mission essential tools, capabilities, and operations.
Maintained internal system for tracking training and certification of the department of 35 military, government, and contractor personnel, ensuring compliance with DoD policies.
SAIC
2023 To 2024: Cybersecurity Ops Senior Principal, Ft Mead, MD
Served as a technical expert in support of USCYBERCOM mission objectives by developing and maintaining infrastructure and capabilities required to execute operations. Performed tool testing and certification, and developed automation of operational processes to increase productivity and ensure operational security. Led training for the department, providing expertise in JQS writing and course development.
Fulfilled testing requirements of 12 tools/capabilities required to perform mission, authoring reports and submitting them for operational approval.
Developed and managed training objectives of USCYBERCOM JQS for Cyber Persona Operators, creating a training program to certify employees in this work role and training 8 new operators.
Managed JIRA and Confluence ticketing system to ensure timely processing of requests for approval of mission essential tools, capabilities, and operations.
Maintained internal system for tracking training and certification of the department of 35 military, government, and contractor personnel, ensuring compliance with DoD policies.
Owl Cyber Defense
2022 To 2023: Senior Sales Engineer/Business Development, Columbia, MD (Hybrid)
Organized business development meetings with leaders in the DoD and Intelligence communities. Brought customer-centric improvements in development and engineering teams by channeling customer feedback into actionable requirements for new capabilities. Carried out thorough testing and troubleshooting on various software and hardware platforms, such as Linux and Windows. Managed sales operations while acquiring an average deal value of $1M.
Played a pivotal role in acquiring critical NSA and government contracts through the creation and certification of a fully functional product demo while securing projected revenue of $59MM and driving a 65-70% increase in industry conference lead generation.
Articulated technical specifications, collected customer technical data, and aligned products with customer needs while cooperating with the sales team in promoting cross-domain solutions and one-way diodes.
Operated VMWare for testing cross-domain solutions and data diodes in environments replicating customer specifications.
Bolstered product export to 7 international markets while managing ICHAR controls.
Cooperated with the engineering team of 23 for specific configuration adjustments and partnered with the marketing team for budget management while enhancing client engagement and brand recognition by 60%.
2021 To 2022: Technical Sales Engineer, Columbia MD (Remote)
Set up technical presentations and demonstrations of cross-domain solutions (CDS) and one-way diodes while aligning product capabilities with client requirements. Administered on-site product installations while warranting optimal functionality and client satisfaction. Prepared and delivered impactful presentations at trade shows while showcasing Owl's technology and product portfolio.
Conducted thorough testing and troubleshooting on diverse software and hardware platforms, including Linux and Windows for high product reliability and performance.
Leveraged Top Secret Clearance and prior experience with 6 key government agencies to expedite sales cycles that led to a reduction in an average of 18 months to mere weeks.
Used VMWare for intricate testing of CDS and data diodes while creating client-server environments that accurately simulated customer scenarios.
Collaborated with account executives to secure major clients, such as the Department of Defense (DOD) and the National Geospatial-Intelligence Agency (NGA), resulting in over $3MM in revenue.
Command Systems Solutions & Decisions
2021 To 2021: Cyber Intelligence Analyst, Honolulu, HI
Carried out cyber intelligence analysis for the USINDOPACOM J2 (Intelligence) with a focus on mitigating threats. Produced detailed reports to address Requests for Information (RFIs) from the J2 while warranting timely and accurate intelligence dissemination. Led strategic engagements and shaped the mission priorities of the Commander to achieve mission objectives.
Enhanced the Joint Chiefs' understanding of complex cyber issues by providing expert interpretation of all-source intelligence in compliance with emergent cyber and intelligence trends.
Performed long-term threat and malicious cyber activity analysis with an emphasis on the USINDOPACOM networks and Area of Responsibility (AOR) for robust defense strategies.
Authored and delivered insightful analysis products to the J6 to maintain rigorous twice-daily and thrice-weekly briefing schedules.
Alion Science & Technology
2020 To 2021: Cyber Operations SME/Cyber Exercise Range Scenario Developer, Honolulu HI
Revitalized the training and operational testing of Computer Network Exploitation techniques by developing and implementing diverse cyber range scenarios. Demonstrated VMware expertise in installing, building, and networking virtual machines for training and operational purposes. Provided leadership support in delineating the responsibilities and deliverables, such as transforming an ambiguous job description into a clear and actionable Statement of Work.
Directed global offensive cyber exercises while achieving technical operability of the cyber range by connecting remotely worldwide.
Bolstered the 352 Cyber Operations Squadron by configuring/testing Linux, Windows, and 10 network devices and crafted scenarios for various exercises.
Operationalized Cisco servers and switches by modifying ACLs, routes, and protocols to tailor each training environment.
Recommended, coordinated, and integrated operating systems involving Windows 10, 8, and Linux OS variants (Red Hat CentOS, Fedora, Debian, and Ubuntu) to build a dynamic cyber training range.
US Navy
2017 To 2020: Lead Certified Exploitation Analyst (Formerly R&T Analyst) - NSA/CSS, Wahiawa, Oahu, HI
Led a team of 100 personnel encompassing 50 direct reports, in the Office of Cyber Operations (OCO). Spearheaded the planning and execution of Computer Network Exploitation (CNE) operations with joint-service military and civilian personnel as a Certified CNO Exploitation Analyst. Mastered the use of Moodle for e-learning and virtual training while ensuring efficient dissemination of knowledge. Provided mentorship to intelligence experts in area of target development and tailored access operations, including tools, techniques, and procedures.
Revolutionized the training curriculum for Computer Network Operations in Hawaii, impacting 27 trainers and 40-50 trainees, resulting in a surge in capstone project success rates from 65% to 95%.
Saved the government over $100K in training costs while reducing the failure rate in capstone projects by 30% minimized the need for retraining or replacement of students.
Introduced and instructed 28 analysts on new and emerging toolsets for Digital Network Intelligence (DNI).
Raised pass rate of CYBR3800 by over 40% via a robust in-house training program for the Exploitation Analyst pipeline at NSA Hawaii.
Managed a team of 30+ service members while overseeing performance evaluations, mentorship, and administrative functions.
Fostered strong inter-agency partnerships with the FBI to align mutual targets of interest and maximize resource utilization.
2017 To 2018: Hawaii Computer Network Operations, East Asia Pacific (Non-Commissioned Officer in Charge (NCOIC) – United States Navy – NSA/CSS)
Ensured alignment with leadership directives and achievement of technical and leadership objectives while directing operational teams.
Led critical missions involving over one hundred joint-service and government personnel with an emphasis on top-priority NSA intelligence targets as a Non-commissioned Officer in Charge.
Implemented recognition programs, resulting in heightened staff morale and acknowledgment of outstanding contributions.
Managed administrative operations, including overseeing duty calls and warranting accurate time reporting by staff.
2018 To 2018: Intelligence Liaison Officer to the Counter Terrorism Mission Center – NSA, Kunia, HI
Served as the sole NSA representative in a high-impact operations center during non-business hours while acting as the central point of contact for all SIGINT-related inquiries and support.
Steered ongoing counter-terrorism operations against priority targets while performing direct and time-sensitive Dialed Number Recognition (DNR) analysis via NSA enterprise and SIGINT systems.
Secured the role of liaison officer and intelligence analyst on a 24/7 watch floor for a top-priority national intelligence mission.
Enabled the prompt delivery of actionable intelligence to customers within the Intelligence Community (IC) while cultivating productive relationships with 6 mission partners.
2014 To 2017: Certified Exploitation Analyst, Navy Information Operations Command Hawaii, 501 Combat Mission Team, Kunia, HI
Oversaw a 15-member team and drove the day-to-day operations as a Project Lead. Determined core requirements and interviewed staff to bring them on board. Maintained security compliance and adhered to training for becoming an operational team member. Ensured compliance with regulatory standards and generated quarterly data analytic reports.
Planned and executed Computer Network Exploitation (CNE) operations for US Cyber Command as an Exploitation Analyst.
Established multiple intelligence collection points and facilitated the reporting of intelligence reports disseminated throughout the Intelligence Community (IC).
Analyzed data collected from CNE operations and developed/executed numerous operations.
2013 To 2014: Digital Network Intelligence Analyst, Navy Information Operations Command Pensacola, Pensacola, FL
Employed all-source research techniques to determine distinct characteristics and traits of target networks. Conducted thorough analyses of targets' use of communication technologies and digital network systems that detected vulnerabilities and potential for exploitation.
Analyzed large volumes of analytic and technical data and redesigned/documented high-priority national target networks by utilizing skills in network theory/components, addressing, routing, and protocols.
Served as a Certified Digital Network Exploitation Analyst, specializing in digital network analysis and target development against critical national targets.
Brought improvements in vulnerability identification and strategic exploitation capabilities by innovating methods for exploiting specific target networks, 100 computer systems, and various hardware/software.
Volunteer Work
Sexual Assault Victim Advocate, U.S. Navy
Education & Certifications
Bachelor's of Nursing | The George Washington University (Expected: January 2027)
SANS Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | Joint Cyber Analysis Course | Requirements and Targeting Emersion Program | Certified Ethical Hacker Bootcamp | Network Traffic Analysis | Basic Metadata Queries (MDR2) | Digital Network Intelligence Workshop | XKEYSCORE Applied Analytics I | Security+ Bootcamp | TCP/IP Networking | Understanding Network Fundamentals | Interconnecting Cisco Network Devices I | Network+ Bootcamp | Introduction to UTT | Operating Systems Fundamentals | Red Hat Linux Fundamentals
“I have known Kaylee Gurak professionally since 2015 when she reported to my department as an exploitation analyst and supervisor. Throughout the next few years, I was privileged to supervise her, as she took on management and process improvement tasks in the organization. Her leadership and mentorship to more junior members of our organization was vital to our team’s success.” - Patrick F., U.S. Navy Chief