About Us
Fighting bad actors since 2005.
Event Leads
Class Leads
photo
Wellington Lee
Sandia National Laboratories
Wellington leads the Malware Analysis class. He is a cybersecurity researcher who is interested in too many things in cyber. Wellington enjoys analyzing malware, building analytic capabilities, and participating in the occasional CTF.
photo
Chris Rawlings
Los Alamos National Laboratory
Chris is a cyber security research and development scientist at Los Alamos National Laboratory. He co-developed and teaches the Host Forensics class at Cyber Fire Foundry and Cyber Fire Summer School. He also runs the Cyber Fire Simulation events.
photo
Todd Lindquist
National Nuclear Security Administration
Todd is the Cyber Operations Technical Lead for a team of intrusion analysts and incident responders supporting NNSA sites. He has been teaching and updating the Network Archaeology class for over 3 years.
photo
Aaron Scott Pope
Los Alamos National Laboratory
Aaron leads the Entry Point class and assists with the Simulation events. He is a researcher at LANL whose work lies at the intersection of cybersecurity, machine learning, and graph theory.
photo
Kelcey Tietjen
Sandia National Laboratories
Kelcey leads the Incident Coordination class. He has been an active incident responder and forensicator since 2004. Kelcey has built, managed, or worked in incident response capabilities at Mandiant, Apple, Bechtel, and LANL. He currently manages a cybersecurity research group at SNL which focuses on developing tools and capabilities for incident responders.
photo
Daniel Noyes
Idaho National Laboratory
Daniel Noyes is an instructor for the operational technology class. He is project manager for energy threats at Idaho National Laboratory and has experience in many aspects of cyber security for critical infrastructure.