Neale worked from 1997-2010 as an incident responder at Los Alamos National Laboratory.
After developing the field of Network Archaeology in 2008,
he has been called to investigate multiple high-profile events across the US Federal Government.
He began Cyber Fire as a means to teach others his techniques,
and now leads execution of the expanded Cyber Fire program.
Gillian Hsieh Ratliff
Gillian handles venue, sponsor, and vendor logistics;
setup and teardown of events;
and all other operations tasks.
Summer School Lead
Grace began as a student in the 2017 Cyber Fire Summer school, and now oversees the school. She also handles some of the strategic growth opportunities for the program.
Chris is a cyber security research and development scientist at Los Alamos National Laboratory.
He co-developed and teaches the Host Forensics class at Cyber Fire Foundry and Cyber Fire Summer School.
He also runs the Cyber Fire Simulation events.
Malware Analysis Class Lead
Lauren is an incident responder on the Computer Security Incident Response Team (CSIRT) at Los Alamos National Laboratory. Although a capable generalist, she specializes in malware analysis. She developed and teaches the Malware Analysis class at Cyber Foundry.
Host Forensics Class Lead
Chris is a cyber security research and development scientist at Los Alamos National Laboratory. He co-developed and teaches the Host Forensics class at Cyber Fire Foundry and Cyber Fire Summer School. He also runs the Cyber Fire Simulation events.
Network Archaeology Class Lead
Todd is the Cyber Operations Technical Lead for a team of intrusion analysts and incident responders supporting NNSA sites. He has been teaching and updating the Network Archaeology class for over 3 years.
Entry Point Class Lead
Aaron leads the Entry Point class and assists with the Simulation events. He is a researcher at LANL whose work lies at the intersection of cybersecurity, machine learning, and graph theory.
Incident Coordination Class Lead
Kelcey leads the Incident Coordination class. He has been an active incident responder and forensicator since 2004. Kelcey has built, managed, or worked in incident response capabilities at Mandiant, Apple, Bechtel, and LANL. He currently manages a cybersecurity research group at SNL which focuses on developing tools and capabilities for incident responders.
Operational Technology Class Lead
Daniel Noyes is an instructor for the operational technology class. He is project manager for energy threats at Idaho National Laboratory and has experience in many aspects of cyber security for critical infrastructure.