About Us
Fighting bad actors since 2005.
Event Leads
photo
Neale Pickett
Los Alamos National Laboratory
Neale worked from 1997-2010 as an incident responder at Los Alamos National Laboratory. After developing the field of Network Archaeology in 2008, he has been called to investigate multiple high-profile events across the US Federal Government. He began Cyber Fire as a means to teach others his techniques, and now leads execution of the expanded Cyber Fire program.
photo
Gillian Hsieh Ratliff
Los Alamos National Laboratory
Gillian handles venue, sponsor, and vendor logistics; setup and teardown of events; scheduling; and all other operations tasks.
photo
Chris Rawlings
Los Alamos National Laboratory
Chris is a cyber security research and development scientist at Los Alamos National Laboratory. He co-developed and teaches the Host Forensics class at Cyber Fire Foundry and Cyber Fire Summer School. He also runs the Cyber Fire Simulation events.
Class Leads
photo
Lauren Pearce
Los Alamos National Laboratory
Lauren is an incident responder on the Computer Security Incident Response Team (CSIRT) at Los Alamos National Laboratory. Although a capable generalist, she specializes in malware analysis. She developed and teaches the Malware Analysis class at Cyber Foundry.
photo
Chris Rawlings
Los Alamos National Laboratory
Chris is a cyber security research and development scientist at Los Alamos National Laboratory. He co-developed and teaches the Host Forensics class at Cyber Fire Foundry and Cyber Fire Summer School. He also runs the Cyber Fire Simulation events.
photo
Todd Lindquist
National Nuclear Security Administration
Todd is the Cyber Operations Technical Lead for a team of intrusion analysts and incident responders supporting NNSA sites. He has been teaching and updating the Network Archaeology class for over 3 years.
photo
Aaron Scott Pope
Los Alamos National Laboratory
Aaron leads the Entry Point class and assists with the Simulation events. He is a researcher at LANL whose work lies at the intersection of cybersecurity, machine learning, and graph theory.
photo
Kelcey Tietjen
Sandia National Laboratories
Kelcey leads the Incident Coordination class. He has been an active incident responder and forensicator since 2004. Kelcey has built, managed, or worked in incident response capabilities at Mandiant, Apple, Bechtel, and LANL. He currently manages a cybersecurity research group at SNL which focuses on developing tools and capabilities for incident responders.
photo
Daniel Noyes
Idaho National Laboratory
Daniel Noyes is an instructor for the operational technology class. He is project manager for energy threats at Idaho National Laboratory and has experience in many aspects of cyber security for critical infrastructure.