Bryce Maxheimer

Indianapolis, IN · brycemaxheimer2@gmail.com

TS/SCI w/ CI Polygraph

LinkedIn · GitHub · GIAC verification

Download PDF View PDF in new tab

Professional summary

Cybersecurity professional and U.S. Marine Corps Cyber Warfare Operator veteran with 4+ years of hands-on experience in threat hunting, digital forensics, network defense, and cyber infrastructure management. Adept in tools such as Splunk, Security Onion, Autopsy, and FTK. Proven leader in high-stakes environments with a strong foundation in policy compliance, blue-team operations, and adversary emulation. Currently pursuing a B.S. in Applied Cybersecurity. Active TS/SCI with CI Polygraph.

Technical skills

Tools & platforms
Splunk, Security Onion, Autopsy, FTK, Palo Alto Firewalls, Microsoft Deployment Toolkit, Microsoft Sentinel
Operating systems
Linux (Red Hat, Ubuntu), Windows Server / Enterprise Workstation
Cyber ops
Threat hunting, malware analysis, digital forensics, incident response
Frameworks
STIGs, DoD cybersecurity standards, MITRE ATT&CK, NIST 800-53
Networking
Network mapping, enumeration, packet analysis (Wireshark), TCP/IP, DNS
Soft skills
Leadership, team instruction, high-stress decision making, cross-functional collaboration, problem solving, analytical thinking, initiative

Professional experience

Shift Lead

2025-07 — Present

Defense Finance and Accounting Service (DFAS)

  • Identified suspicious network traffic patterns through Microsoft Sentinel that led to the initiation of formal security incident investigations.
  • Collected and analyzed digital artifacts to support threat hunting operations and incident response activities.
  • Processed and analyzed 30,000+ security alerts while establishing baseline network behavior patterns.
  • Created automated toolsets, developed SOPs, ensured audit requirements were met, and authored SIEM rules to close security gaps and harden infrastructure.
  • Performed digital forensics on systems in response to alerts and in support of investigations.

Cyber Security Analyst / Infrastructure Architect

2022-02 — 2025-05

United States Marine Corps — Defensive Cyber Operations

  • Conducted advanced threat hunting using Splunk and Security Onion, developing custom dashboards and queries to identify anomalous traffic.
  • Led digital forensic investigations using Autopsy and FTK; produced reports on malware behavior, registry artifacts, and file system anomalies.
  • Architected and maintained virtual infrastructure supporting 100+ users, ensuring high availability of mission-critical tools.
  • Enforced STIG compliance across legacy and modernized systems, enhancing cybersecurity resilience of classified infrastructure.

Education

SANS Technology Institute

Expected 2027-01

B.S. in Applied Cybersecurity (BACS) — in progress

USMC Cyber Operators Specialist Course

Completed 2023-10

Joint Cyber Analysis Course (NSA Certified)

Completed 2023-05

Alvin Community College

Graduated 2020-05

Associate's Degree, General Studies

Certifications

Full descriptions and PDFs on the Certifications page.

Awards & recognition

National Cyber League — Diamond 1 Medal
2025-11

Recognized for scoring in the 97th percentile overall in the Fall 2025 Individual Game for the National Cyber League.

Navy and Marine Corps Achievement Medal
2024-11

Awarded for analyzing 3.5M+ daily packets across critical networks and leading defensive cyberspace operations in Okinawa, JP.

Meritorious Mast
2023-05

Recognized for exemplary leadership of 75 Marines during the Joint Cyber Analysis Course.


Last updated: 2026-04-30 · See also: Certifications · Projects