Matthew Kilgore

Cybersecurity Professional & AI Enthusiast

Active Top Secret Clearance

U.S. Army veteran with 6+ years in federal cybersecurity. Building AI-powered security tools in my home lab while pursuing my M.S. in Cybersecurity.

About

I'm a cybersecurity professional and U.S. Army veteran with over 6 years of experience supporting federal security and compliance programs across classified enterprise environments. My expertise spans the full RMF lifecycle, NIST SP 800-53 compliance, ATO authorization, and security documentation.

At Raytheon, I served as an Information Systems Security Officer managing classified systems, improving security posture through proactive vulnerability scanning, and developing PowerShell automation that reduced account lifecycle risk by 25%. Before that, I led a 30-person cybersecurity team in the Army supporting 850+ users across distributed classified environments.

Now, I'm expanding into AI and machine learningthrough hands-on projects in my home lab. I'm building and deploying AI-powered security tools, experimenting with LLMs for threat analysis, and exploring how artificial intelligence can revolutionize defensive security operations. Currently completing my M.S. in Cybersecurity at Western Governors University (expected 2026).

Projects

Hands-on projects from my home lab where I'm learning AI and deploying security tools

Home Cybersecurity LabFeatured

Enterprise-grade security monitoring environment featuring Wazuh SIEM and Suricata IDS/IPS deployed in a Docker-based segmented network with OPNsense firewall controls. Conduct vulnerability scanning, log analysis, and threat simulation exercises applying NIST SP 800-53 controls and MITRE ATT&CK TTPs.

WazuhSuricataDockerOPNsenseNIST 800-53MITRE ATT&CK

LLM Security AssistantIn Development

Developing a local LLM-powered assistant for security operations. Analyzes logs, suggests remediation steps, and helps automate incident response workflows using open-source language models.

LLMsPythonOllamaSecurity Automation

AI-Powered Threat DetectionScheduled

Experimenting with machine learning models for automated threat detection and log analysis. Building custom models trained on security event data to identify anomalous patterns and potential intrusions in real-time.

PythonTensorFlowMachine LearningLog Analysis

PowerShell Security Automation

Collection of PowerShell scripts for enterprise security automation including stale account remediation, compliance reporting, and STIG validation. Reduced administrative overhead by 50% in production environments.

PowerShellActive DirectorySTIGAutomation

Network Intrusion Detection Lab

Hands-on lab environment for testing and tuning IDS/IPS rules. Simulates various attack scenarios using MITRE ATT&CK techniques to improve detection capabilities and reduce false positives.

SuricataZeekPCAP AnalysisThreat Hunting

Vulnerability Management Dashboard

Custom dashboard aggregating vulnerability data from multiple scanners (Nessus, ACAS) with automated risk scoring and remediation tracking. Built to streamline POA&M management.

PythonNessusRisk AssessmentDashboards

Experience

Information Systems Security Officer · Raytheon

AUG 2023AUG 2025 · Tucson, AZ

Managed the full RMF lifecycle for classified systems including security categorization, control selection, implementation, assessment, authorization, and continuous monitoring in alignment with NIST SP 800-53 and DISA STIG requirements.

  • Improved security posture by 10% through proactive vulnerability scanning and coordinated remediation using Splunk, Nessus, and Tenable/ACAS
  • Reduced account lifecycle risk by 25% within 3 months by developing PowerShell automation for stale account remediation
  • Developed comprehensive security documentation including SSPs, SARs, and POA&Ms to support ATO authorization
RMFNIST 800-53SplunkNessusPowerShelleMASS

Senior Network Communications Specialist · U.S. Army

JUL 2019JUL 2023 · Germany

Led a 30-person cybersecurity and IT team supporting 850+ users across distributed classified and unclassified environments while maintaining compliance with DoD security standards.

  • Sustained 95% operational continuity while maintaining full compliance with DoD security standards
  • Reduced administrative overhead by 50% through PowerShell automation of security tasks
  • Enforced STIG requirements and managed Active Directory including GPO, user provisioning, and system hardening across Secret and unclassified networks
Team LeadershipActive DirectorySTIG HardeningIncident Response

SkillBridge Intern — Web Systems Administration · Peraton

JAN 2023JUN 2023 · Fort Huachuca, AZ

Resolved 500+ ACAS findings across multiple DoD networks, significantly reducing vulnerability exposure and strengthening enterprise security posture across classified systems.

  • Maintained 300+ Microsoft SQL Server databases with STIG adherence
  • Authored SOPs and SSPs supporting compliance and system administration consistency
  • Coordinated with multi-disciplinary teams to implement timely patches
ACASSQL ServerSTIGVulnerability Management

Education

Expected 2026

M.S., Cybersecurity & Information Assurance

Western Governors University

2025

B.S., Software Development & Security

University of Maryland Global Campus

Skills

Compliance & Authorization

RMF LifecycleNIST SP 800-53ATOPOA&MSSP/SAReMASS

Security Operations

Vulnerability ManagementContinuous MonitoringIncident ResponseSTIG HardeningThreat HuntingLog Analysis

Tools & Platforms

SplunkNessus/ACASWazuhSuricataTenableSolarWinds

Infrastructure

Active DirectoryWindows ServerLinuxTCP/IPFirewall AdminDocker

Scripting & Automation

PowerShellPythonBashSecurity AutomationSQL

AI/ML (Learning)

TensorFlowMachine LearningLLMs/OllamaLog Analysis MLThreat Detection AI

Certifications

CompTIA Security+

Active

CompTIA CySA+

Active

ISC2 CC

Active

CompTIA PenTest+

Expected Apr 2026

Contact

I'm actively seeking opportunities in cybersecurity and AI engineering where I can apply my federal security experience while growing my machine learning skills. Whether you have a role that might be a fit, want to discuss a project, or just want to connect, I'd love to hear from you.