Digital Sanctuary of Knowledge
Welcome to a realm where incident response meets innovation. I'm Billy Drummond, an Incident Response and Recovery Expert with over a decade of cybersecurity experience, including managing large technical teams and developing advanced training programs. Here, complex forensic concepts become clear, and every question sparks deeper understanding.
Digital Forensics
Advanced Investigation & Analysis
Malware Analysis
Threat Detection & Reverse Engineering
Incident Response
Recovery & Threat Mitigation
Digital Forensics and Malware Subject Matter Expert
Comtech
- Lead development of 80+ hours of curriculum in Digital Forensics, Incident Response, and Malware Analysis aligned to real-world SOC use cases
- Created custom malware exercises using C++, Python, Ruby, and VB to simulate advanced threats for analyst training
- Supervise 85 instructors delivering 1,000+ hours of cybersecurity instruction across multiple technical domains
- Conduct forensic investigations on insider threat and corporate espionage cases, supporting incident response efforts
- Advise executive leadership on organizational threat posture, IR readiness, and threat intelligence integration
Cyber Mission Forces Subject Matter Expert
U.S. Navy
- Oversaw 1,200+ hours of curriculum supporting qualification pipelines for NSA and Navy roles including Threat Emulators, Planners, and Defensive Cyber Investigators
- Advised on threat hunting, SIEM analysis, digital forensics, and cyber threat intelligence to align training with evolving adversary tactics
- Delivered 16 hours of core computer science instruction to incoming Cyber Warfare Officers
- Instructed 40+ hours of Security+ and Information Security coursework for Navy Information Technicians
Cyber Threat Emulation Systems Architect (Windows)
U.S. Navy
- Integrated APT intelligence from FireEye and internal sources into SOC workflows and SIEMs (Splunk, RedSeal) to enhance threat detection and response
- Developed 80+ hours of training on Information Warfare, Forensics, Incident Response, and Secure Software Development for SOC analyst readiness
- Conducted malware analysis on zero-day threats from nation-state actors, reporting in alignment with CISA and NSA protocols
- Maintained three deployable IR kits with EnCase, virtualized tools, and monitoring platforms; administered SharePoint for IR coordination and asset tracking
IT Systems Administrator
U.S. Navy
- Administered and secured a 6,000-node information systems network, delivering technical, networking, and threat intelligence support
- Identified insider threat indicators and conducted preliminary investigations to safeguard national security assets
- Led development of a secure DoD messaging application using HTML and C#, overseeing a small development team
- Created qualification procedures for threat identification and provided hands-on technical support to end users
Physical Security Specialist
U.S. Navy
- Advised on the implementation of NFC/RFID security systems aboard U.S. Navy carriers to enhance physical security in foreign operational areas
- Supported the deployment of NFC-based access controls for securing classified spaces on next-generation carriers
- Oversaw physical security operations aboard the USS George H. W. Bush, ensuring 24/7 monitoring and response readiness
- Conducted prisoner handling procedures while underway, ensuring the safety and security of crew and detainees
Digital Forensics & Analysis
Programming & Development
Security & Infrastructure
Training & Leadership
Cybermorph.co
React.js HTML site for personal resume and technological discussion and personal and professional development. Contains Q&A forum, resume builder, account management system, and blog for cybersecurity topics.
PhoenixTrek
React.js HTML site utilizing MongoDB implementing online database for custom student tracking. Comprehensive platform for managing cybersecurity training programs and student progress.
Malware Generator
C++/C# GUI based tool used to custom generate malware for analysis. Advanced training tool for cybersecurity professionals to practice malware detection and analysis techniques.
Spotlight Incident Response Disk
Custom Linux-based Operating System focused on initial incident response and recovery. Specialized toolkit for rapid deployment in cybersecurity incident scenarios.
Bachelor of Science in Network Security
University of Maryland Global Campus
Major: Network Security | Minor: Psychology
Bachelor of Science in Software Engineering
Western Governors University
Major: Software Engineering