JS
Preparing to start...
Jackson Stephens

Security Engineer & Researcher

jackson@stephens.sh
Works at: as Security Engineer & Researcher
Expertise:

Jackson Stephens

Security Engineer & Researcher

Professional Summary

Security Engineer and Researcher with deep experience in network defense, incident response, and vulnerability assessment. Proven track record in competitive cybersecurity environments including multiple first-place finishes at RMCCDC and strong performances at National CCDC and DOE CyberForce. Skilled at hardening infrastructure under pressure, identifying and remediating vulnerabilities, and building resilient security architectures.

Technical Skills

Network Defense
Firewall Configuration, IDS/IPS, Network Monitoring, Traffic Analysis, Segmentation
Incident Response
Threat Detection, Log Analysis, Forensics, Malware Triage, SIEM Operations
System Hardening
Linux/Windows Hardening, Patch Management, Group Policy, Secure Baselines, CIS Benchmarks
Vulnerability Assessment
Nmap, Nessus, Burp Suite, Vulnerability Scanning, Risk Prioritization
Infrastructure Security
Active Directory, DNS, Web Servers, Database Security, Cloud Security Fundamentals
Tools & Platforms
Python, Bash, PowerShell, Wireshark, Splunk, ELK Stack, Docker, Git

Featured Projects

RMCCDC Infrastructure Defense

  • Secured Active Directory, DNS, web servers, and database infrastructure under time pressure
  • Developed rapid hardening scripts for automated baseline security deployment
  • Coordinated team incident response workflows to detect and contain active intrusions
  • Achieved multiple first-place finishes at Rocky Mountain CCDC regionals

Sandia Labs Hackathon

  • Identified and exploited vulnerabilities in simulated critical infrastructure environments
  • Won top placements through systematic vulnerability enumeration and creative exploitation
  • Applied reverse engineering techniques to analyze and defeat security mechanisms

Professional Experience

CyberForce Competition

  • Defended operational technology and IT networks against coordinated attack scenarios
  • Implemented monitoring and alerting pipelines to detect anomalous activity in real time
  • Balanced security hardening with service availability under competition constraints

National CCDC Competitor

  • Competed at the national level defending enterprise infrastructure against professional red teams
  • Managed cross-platform environments including Windows Server, Linux, and network appliances
  • Built and executed incident response playbooks under live attack conditions
  • Mentored team members on defensive techniques and competition strategy

Security Research

  • Conducted vulnerability assessments on web applications and network infrastructure
  • Developed security tooling and automation scripts for reconnaissance and hardening
  • Contributed to open-source security projects and community knowledge sharing
  • Studied malware analysis, reverse engineering, and exploit development techniques