Neale Pickett Los Alamos National Laboratory Neale worked from 1997-2010 as an incident responder at Los Alamos National Laboratory. After developing the field of Network Archaeology in 2008, he has been called to investigate multiple high-profile events across the US Federal Government. He began Cyber Fire as a means to teach others his techniques, and now leads execution of the expanded Cyber Fire program.
Gillian Hsieh Ratliff Los Alamos National Laboratory Gillian handles venue, sponsor, and vendor logistics; setup and teardown of events; scheduling; and all other operations tasks.
Chris Rawlings Los Alamos National Laboratory Chris is a cyber security research and development scientist at Los Alamos National Laboratory. He co-developed and teaches the Host Forensics class at Cyber Fire Foundry and Cyber Fire Summer School. He also runs the Cyber Fire Simulation events.
Wellington Lee Sandia National Laboratories Wellington leads the Malware Analysis class. He is a cybersecurity researcher who is interested in too many things in cyber. Wellington enjoys analyzing malware, building analytic capabilities, and participating in the occasional CTF.
Chris Rawlings Los Alamos National Laboratory Chris is a cyber security research and development scientist at Los Alamos National Laboratory. He co-developed and teaches the Host Forensics class at Cyber Fire Foundry and Cyber Fire Summer School. He also runs the Cyber Fire Simulation events.
Todd Lindquist National Nuclear Security Administration Todd is the Cyber Operations Technical Lead for a team of intrusion analysts and incident responders supporting NNSA sites. He has been teaching and updating the Network Archaeology class for over 3 years.
Aaron Scott Pope Los Alamos National Laboratory Aaron leads the Entry Point class and assists with the Simulation events. He is a researcher at LANL whose work lies at the intersection of cybersecurity, machine learning, and graph theory.
Kelcey Tietjen Sandia National Laboratories Kelcey leads the Incident Coordination class. He has been an active incident responder and forensicator since 2004. Kelcey has built, managed, or worked in incident response capabilities at Mandiant, Apple, Bechtel, and LANL. He currently manages a cybersecurity research group at SNL which focuses on developing tools and capabilities for incident responders.
Daniel Noyes Idaho National Laboratory Daniel Noyes is an instructor for the operational technology class. He is project manager for energy threats at Idaho National Laboratory and has experience in many aspects of cyber security for critical infrastructure.