Cryptologic Technician Networks (CTN) Evals
Digital Network Exploitations Analyst and Division Leading Petty Officer at Navy Information Operations Command Pensacola, Florida. As Leading Petty Officer of Training Division, she led a diverse and evolving Division of 98 Sailors, ensuring timely completion of operational JQRs and computer-based training resulting in the modification and improvement of the training pipeline and the qualification of 269 sailors with zero delinquencies. Tracked and managed 200 Division trainings grooming junior personnel to evaluate, facilitate and brief training.
Her leadership directly assisted in the identification of over 500,000 digital threats and successfully defended Department of Defense networks against over 300,000 attempted cyber attacks. Her team was recognized by the Federal Bureau of Investigation, Central Intelligence Agency, Defense Intelligence Agency, Department of State, United States Central Command, and United States Cyber Command, ultimately earning her selection as National Threat Operations Center (NTOC) Texas Military Performer of the Year. In addition, she efficiently managed six divisional safety petty officers in the enforcement of the Command’s safety program for a 140 Sailor department resulting in zero safety incidents for the department.
As a Navy Web Risk Assessment Cell analyst, she demonstrated superior technical acumen and supervisory skill while conducting assessments on 877 public facing and 346 common access card enabled official Navy websites. CTN3 Knutson expertly performed scanning, compiled notification data and reported 388 critical vulnerabilities for mitigation to Commander, 10th Fleet Battle Watch Captain. Additionally, Petty Officer Knutson devoted 200 hours trouble shooting various network and software configurations which optimized Web Risk Assessment Cell's scanning capabilities.
As Sensor Operations lead, demonstrated superb leadership and exceptional skill leading 16 Sailors in the production of 1,200 mission critical reports, responsible for the accurate identification of 129 cyber incidents, and directly led to the dissemination of 300 cyber intelligence reports to the Department of Defense, U.S. State Department, and military allies. As an analyst with the Navy Criminal Investigative Service, she processed over 2200 gigabytes of data and provided vital threat indications, warnings, and mitigative solutions.
Master Chief Hawkins paved the way for the command to be the first to successfully integrate Intelligence Specialists into Digital Network Intelligence and Computer Network Defense mission areas, a model adopted by NIOCs across the Fleet Cyber Command Domain. His dynamic leadership and deliberate focus on sailorization left a legacy that includes the creation of "Developing Leaders” program and the inaugural cryptologic technician networks collaboration conference.
Network Analyst at Navy Imformation Operations Command, Pensacola, Florida. As assistant team lead, CTN2 Knoxville's aggressive work ethic and attention to detail were key factors in the creation and development of a new high priority target, leading three analysts in the release of seven high level reports. His detailed reviews and diligent training of seven team members ensured minimal rework and increased productivity.
Exceptional Information Warfare leader and technician. Selected for independent liaison assignment within the Air Force Electronic Systems Center Network Warfare Systems Branch. Leads dynamic Information Operations and Information Warfare exchange, collaboration, and technology development as interservice technical liaison. Provided expanded Navy presence and awareness of Service partner’s efforts in IO/IW systems development.
Subject Matter Expert. Representative at 12 technical exchange conferences and industry fairs to review current capabilities, new concepts and future technology. Participated in cutting edge technology demonstrations and drafted three detailed product reviews for Navy IO leadership.
Technical liaison for 23 Information Operations tools produced by the 688th Information Operations Wing. Participated in 12 preliminary demonstration tests prior to operational fielding.
Evaluated and categorized over 50 industry white papers and conceptual proposals for Information Operations/Information Warfare systems for further contract review.
Enhanced success of ESC/HSJG RAT. Efforts reduced time required from initial cyber tool assessment to preliminary operational readiness by 25%.
Participated in 35 capability assessments, delivering potent cyber tools to 24th Air Force cyber repository in support of operational commander requirements.
Coordinated the acquisition and security vulnerability analysis of four operating systems, five anti-virus software programs, and three web browser applications.
Configured network components to increase dynamic testing capability in a lab environment.
As Chief of the Bravo Watchteam, he led 13 analysts through more than 2,000 hours of investigation of over 30,000 alarms, 1500 incidents of possible malicious activity, yielding 430 cyber event reports. Petty Officer Knoxville is the epitomy of physical fitness, increasing the command's pass rate by 10% through 144 aggressive fitness sessions.
Petty Officer Knoxville is the cornerstone of the Command Training Team. He facilitated 246 hours of OPSEC, Information Assurance, and multiple professional military topics.
Petty Officer Knoxville assisted a multiservice team of 16 reservists in all areas of operations, ensuring continuity and completion of mission at hand. Additionally, Petty Officer Knoxville's efforts were vital to the timely analysis of over 40,000 intelligence products, and the production of 67 unique-source intellgence products which were critical to combatant commanders and deployed warfighters in the AOR and facilitated the prosecution of the nation's highest priority targets.
Petty Officer Knoxville managed and submitted over 70 trouble tickets as the Information Systems Security officer which resulted in the resolution of mission critical account requistions for all personnel within his team.
While maintaining the Naval Academy's Internal Security Network, CTN2 Smith detected and mitigated a network intrusion and data exfiltration by a foreign state actor while simultaneously recovering all of the compromised data, effectively securing countless individuals' personnel records, clearance details, and financial information thought to have been stolen. Her actions exceeded expectations and saved hundreds of hours of recovery efforts and reinforced the importance of OPSEC in daily operations.
She conducted critical training and during her time at NIOC Maryland. Petty Officer Smith was a deckplate leader at the forefront of developing a training environment to maintain critical skills needed in the CTN community. Petty Officer Smith also dedicated countless hours to the mission, conducting time-sensitive operations against adversaries that prevented interruption to current operations.
Petty Officer Staggs has demonstrated exceptional technical knowledge, adaptability and skills, which he dedicated to protecting DoDIN networks, creating training to ensure others are able to properly protect our nation's secrets and repeatedly discovers whether or not there is adversary presence on a government network.
- Within a few months of arrival at command, analyzed 200 GB of network traffic over 70 hours while deployed for a critical mission and discovered three signs of adversary presence on the network which ensured timely notification of these network vulnerabilities on DoD network.
- Diligently analyzed 700GB of network traffic captured from a DoDIN enclave, and thanks to this timely analysis, it was reported that there was zero evidence of advanced persistent threats to the network resulting in the successful completion of the mission to verify the security of that network.
- Delivered two technical briefs to high-level commanders, providing in depth analytical detail, increased situational awarenesss, and overall insight on mission accomplishments by cyber protection team 90.
- Through 260 hours of analysis on 16 Terabytes of network traffic and 360 Megabytes of appliciance logs and database files from a 16,000+ node DoD global network, discovered seven misplaced network adminstrator artifacts and malicious traffic, leading to the creation and implementation of 12 indicators of compromise.
- Authored 6 SOPs detailing proper operation of three network analysis tools, one core component of a kit being implemented to CPTs navy wide, two analysis methodology guides and provided 40 hours of technical training to 30 sailors which faciliitated tool navigation and troubleshooting for two concurrent missions.
- Trained 3 national CPTs on the capabilities, proper use and troubleshooting methods to be used on a core part of their mission critical toolset.
- Verified the compliance of a key DoD Network through analysis and evaluation of 20 network device configurations, 3 network maps and 3000 lines of nesus scan results.
- Evaluated the effectiveness of an exploit against DoD infrastructure and helped verify the effectiveness of already prepared mitigations.
- Deployed OCONUS for 30 days to evaluate 200 overseas critical industrial control systems comprised of 3 desktops, 47 network devices and 150 PLCs for any security gaps that existed.
Despite short deployment times, completely different fields of technology to analyze, inaccuracy of customer provided information and a constantly changing space in which we conduct our operations, petty officer Staggs has met the challenges each time and demonstrated an impressive amount of skill, dedication and adaptability when it comes to technical analysis. He is an outstanding example for his fellow analyst to emulate and deserves official recognition for his high level of performance. I give my highest recommendation for this award.