Bryce Maxheimer
Indianapolis, IN · brycemaxheimer2@gmail.com
TS/SCI w/ CI Polygraph
LinkedIn · GitHub · GIAC verification
Professional summary
Cybersecurity professional and U.S. Marine Corps Cyber Warfare Operator veteran with 4+ years of hands-on experience in threat hunting, digital forensics, network defense, and cyber infrastructure management. Adept in tools such as Splunk, Security Onion, Autopsy, and FTK. Proven leader in high-stakes environments with a strong foundation in policy compliance, blue-team operations, and adversary emulation. Currently pursuing a B.S. in Applied Cybersecurity. Active TS/SCI with CI Polygraph.
Technical skills
- Tools & platforms
- Splunk, Security Onion, Autopsy, FTK, Palo Alto Firewalls, Microsoft Deployment Toolkit, Microsoft Sentinel
- Operating systems
- Linux (Red Hat, Ubuntu), Windows Server / Enterprise Workstation
- Cyber ops
- Threat hunting, malware analysis, digital forensics, incident response
- Frameworks
- STIGs, DoD cybersecurity standards, MITRE ATT&CK, NIST 800-53
- Networking
- Network mapping, enumeration, packet analysis (Wireshark), TCP/IP, DNS
- Soft skills
- Leadership, team instruction, high-stress decision making, cross-functional collaboration, problem solving, analytical thinking, initiative
Professional experience
Shift Lead
2025-07 — PresentDefense Finance and Accounting Service (DFAS)
- Identified suspicious network traffic patterns through Microsoft Sentinel that led to the initiation of formal security incident investigations.
- Collected and analyzed digital artifacts to support threat hunting operations and incident response activities.
- Processed and analyzed 30,000+ security alerts while establishing baseline network behavior patterns.
- Created automated toolsets, developed SOPs, ensured audit requirements were met, and authored SIEM rules to close security gaps and harden infrastructure.
- Performed digital forensics on systems in response to alerts and in support of investigations.
Cyber Security Analyst / Infrastructure Architect
2022-02 — 2025-05United States Marine Corps — Defensive Cyber Operations
- Conducted advanced threat hunting using Splunk and Security Onion, developing custom dashboards and queries to identify anomalous traffic.
- Led digital forensic investigations using Autopsy and FTK; produced reports on malware behavior, registry artifacts, and file system anomalies.
- Architected and maintained virtual infrastructure supporting 100+ users, ensuring high availability of mission-critical tools.
- Enforced STIG compliance across legacy and modernized systems, enhancing cybersecurity resilience of classified infrastructure.
Education
SANS Technology Institute
Expected 2027-01B.S. in Applied Cybersecurity (BACS) — in progress
USMC Cyber Operators Specialist Course
Completed 2023-10Joint Cyber Analysis Course (NSA Certified)
Completed 2023-05Alvin Community College
Graduated 2020-05Associate's Degree, General Studies
Certifications
Full descriptions and PDFs on the Certifications page.
- GCFE — GIAC Certified Forensic Examiner 2026-04
- GPYC — GIAC Certified Python Coder 2026-02
- GCIH — GIAC Certified Incident Handler 2025-09
- GSEC — GIAC Security Essentials 2025-07
- GFACT — GIAC Foundational Cybersecurity Technologies 2025-03
- CompTIA PenTest+ 2024-08
- Red Team Certified Professional (RTCP) — Marine Corps Cyberspace Operations Group 2024-04
Awards & recognition
Recognized for scoring in the 97th percentile overall in the Fall 2025 Individual Game for the National Cyber League.
Awarded for analyzing 3.5M+ daily packets across critical networks and leading defensive cyberspace operations in Okinawa, JP.
Recognized for exemplary leadership of 75 Marines during the Joint Cyber Analysis Course.
Last updated: 2026-04-30 · See also: Certifications · Projects