π‘οΈ U.S. Navy Veteran | Operations Leader β Cybersecurity Professional
πͺ£ Repos & ReadMes:
I'm a Navy veteran and former operations leader at Rivian Automotive executing a structured transition into cybersecurity and IT infrastructure. My background in high-stakes operational environments (United States Navy navigation operations, force protection, emergency medicine, and manufacturing operations) has built the foundation for security-focused technical work: incident response, systems thinking, risk assessment, and process-driven troubleshooting.
This GitHub documents hands-on labs, system builds, and troubleshooting workflows aligned to real-world IT and security operations. It's also where I share what my side-learning curiosities are.
π Current Focus:
- Building an enterprise-grade home lab for hands-on cybersecurity training
- Pursuing aggressive certification timeline (4 certs by April 2026)
- Formal IT education: MyComputerCareer (Jan 2026 start) + B.A.A.S. Cybersecurity (EIU, May 2027 completion)
- Targeting entry-level roles: SOC Analyst (Tier 1), IT Support, Help Desk
- Microsoft Certified: Security, Compliance, and Identity Fundamentals - 12/22/2025 Verification
- AWS Certified Cloud Practitioner - 12/31/2025 Verification
- ISC2 Certified in Cybersecurity (CC) - 1/12/2026 Verification
- CompTIA A+ - Core 1 Passed (1/29/2026), Core 2 Scheduled (2/12/26)
- CompTIA Network+ (Planned 3/2026)
- CompTIA Security+ (Planned 3/2026)
- CompTIA CySA+ ((Planned 4/2026))
π₯οΈ Hardware:
- AMD Ryzen 7 7800X3D (8-core, 16-thread)
- 64GB DDR5 RAM
- Dual-boot: Windows 11 / Linux (Ubuntu/Kali/Parrot/Arch)
π οΈ Security & Analysis Tools:
- SIEM: Security Onion (network security monitoring)
- Packet Analysis: Wireshark
- Network Scanning: Nmap
- Penetration Testing: Kali Linux, Parrot
- Virtualization: VMware Workstation Pro, Windows Hyper-V
π©Current Lab Projects:
- Building simulated enterprise network for SIEM log analysis
- Practicing incident detection and response workflows
- Running CTF challenges and vulnerability assessments
- Documenting security tool configurations and use cases
- Active CTF participation and guided labs
- Focus areas: networking fundamentals, Linux, enumeration, basic detection
- Reinforces concepts applied in Security Onion and VM-based lab scenarios
- Led waste management operations for 160+ personnel, reducing costs by 65% ($5.2M annual savings)
- Managed cross-functional projects with finance, engineering, and supply chain teams
- Trained personnel as Rivian Certified Trainer, ensuring safety and process adherence
- Analyzed operational data to identify inefficiencies and implement process improvements
Transferable Skills for IT/Security:
- Incident response & escalation management
- Process documentation & SOP development
- Cross-team coordination under pressure
- Data-driven decision making
- Risk assessment & mitigation planning
- Senior ED Technician at Level 1 Trauma Center (Top 50 U.S. Hospital)
- Clinical preceptor training new staff on emergency protocols and patient care
- Managed high-stakes medical interventions where system reliability = patient safety
- Fluent in healthcare IT workflows (EMR systems, documentation requirements)
Transferable Skills for IT/Security:
- Understanding of healthcare IT systems and compliance (HIPAA)
- Clear communication under pressure
- Troubleshooting critical systems where downtime has severe consequences
- Training and knowledge transfer to users with varying technical literacy
- Navigation operations & visual communications in high-threat environments
- Force protection/anti-terrorism training team instructor
- Maritime interdiction operations (VBSS teams)
- Managed training for 60+ personnel in navigation and surface warfare qualifications
Transferable Skills for IT/Security:
- Security protocols & threat awareness
- Operational discipline in regulated environments
- Team leadership under high-stress conditions
- Incident response & tactical decision-making
- Windows 10/11 (enterprise administration)
- Linux (Ubuntu, Kali, Parrot, command-line proficiency)
- Basic macOS familiarity
- Wireshark (packet capture & analysis)
- Nmap (network discovery & security auditing)
- Security Onion (IDS/IPS, network monitoring)
- Kali Linux (penetration testing tools)
- Ticketing/Project Management: Jira, Atlassian, Asana
- ERP/Supply Chain: SAP, Workday, Smartsheet
- Cloud Platforms: Learning AWS, Azure (certifications in progress)
- Microsoft 365: Office Suite, Teams, SharePoint
- SIEM log analysis and threat detection
- Python for security automation
- Network security fundamentals
- Cloud security architecture (AWS, Azure)
- Incident response methodologies
Bachelor of Applied Arts & Sciences - Cybersecurity
Eastern Illinois University | Expected May 2027
IT Infrastructure & Cybersecurity Program
MyComputerCareer | January 2026 - Present
Associate of Arts
Heartland Community College | Completed 2025
Emergency Medical Technician - Intermediate
Illinois Central College | 2013
Emergency Management Certificate
American Military University | 2010
- National Registry EMT-Basic
- Illinois EMT-Basic & EMT-Intermediate
- ITLS (International Trauma Life Support) - Advanced Provider
- American Heart Association BLS, ACLS
- Federal Emergency Management Agency: ICS 100, 200, 700, 808
- Navy Security Reaction Force - Advanced
- Close Range Subject Control
Building a virtualized enterprise network to practice SIEM log analysis, threat detection, and incident response workflows using Security Onion.
Documenting certification study notes, practice lab configurations, and key learnings in GitHub repositories (coming soon).
Participating in capture-the-flag challenges and vulnerability assessment exercises to build practical offensive/defensive security skills.
- Email: jmcall3883@gmail.com
- LinkedIn: linkedin.com/in/jasonmcallahan
- Bluesky: jmcallahan.bluesky.social
- Location: Normal, Illinois (Open to remote opportunities)
Immediate (Q1 - Q2 2026):
- Complete Microsoft CompTIA A+, Net+, Sec+, CySA+ certifications
- Secure entry-level IT role (Help Desk, SOC Analyst, IT Support)
- Continue hands-on lab work and expand GitHub portfolio with documented projects
Medium-Term (Q3 2026 - Q2 2027):
- Graduate with B.A.A.S. in Cybersecurity from Eastern Illinois University
- Transition into security-focused role (Junior SOC Analyst, Security Operations)
Long-Term (2027+):
- Build expertise in threat detection, incident response, and security operations
- Pursue advanced certifications (CISSP, CEH, or specialized vendor certs)
- Contribute to cybersecurity community through open-source projects and knowledge sharing
My career has been built around high-stakes operational environments where failure isn't an option:
- In the Navy, I operated in threat environments where security protocols were life-or-death.
- In emergency medicine, I managed critical systems where downtime meant patient harm.
- In manufacturing operations, I led process improvements that saved millions while maintaining safety and compliance.
Cybersecurity combines everything I've trained for: risk assessment, incident response, systems thinking, and the discipline to operate under pressure while following documented procedures. This isn't a career changeβit's a redeployment of skills into a domain where they're mission-critical.
This README was last updated: January 30, 2026

