DP

Daniel Perez

Chief Threat Aficionado at Mandiant

Daniel Perez has extensive experience in the field of threat intelligence and cybersecurity. Daniel began their career as a Cyber Security Intern at Avaya Government Solutions in 2011, where they analyzed and monitored inbound and outbound connections to ensure network integrity. Daniel then joined Apex Systems as a Security Analyst before moving to Lockheed Martin as a Cyber Intel Analyst, where they studied network traffic and recommended mitigation options.

In 2013, Perez joined the U.S. Department of State as a Malware Reverse Engineer, conducting analysis of malicious code and providing intrusion detection capabilities. Daniel then joined FireEye, Inc. as a Senior Analyst, tracking threat intelligence feeds and guiding incident response activities. At FireEye, they also served as a Principal Threat Analyst, overseeing all threat intelligence efforts and assessing new threat groups.

Perez joined Mandiant in 2020, serving as a Manager and Senior Manager in their Advanced Practices department. In these roles, they supervised analysts, coached personnel on threat intelligence, and designed organizational processes.

In 2022, Perez joined Google as a Manager, leading the Mandiant Intelligence team. Daniel then became Chief Threat Aficionado at Mandiant (now part of Google Cloud) in 2023.

Throughout their career, Perez has demonstrated expertise in threat analysis, incident response, and cybersecurity practices.

Daniel Perez's education history begins in 2001 when they graduated from Bishop O'Connell High School with a High School Diploma. Daniel then joined the U.S. Navy and attended the U.S. Navy Basic Enlisted Submarine School from 2005 to 2007. After completing their service in the military, Daniel pursued higher education and attended George Mason University from 2010 to 2013. Daniel obtained a Bachelor of Individualized Studies degree with a focus on Cyber Forensic Intelligence Studies.

In addition to their formal education, Daniel has also acquired several certifications. In 2012, they obtained the GIAC Reverse Engineering Malware (GREM) certification from GIAC. Two years later, in 2014, they earned the GIAC Certified Forensic Analyst (GCFA) certification from the same institution. Daniel has also obtained non-academic certifications, including becoming a CrossFit Level 1 Trainer through CrossFit, LLC in August 2022 and completing the "Become a Manager" course offered by LinkedIn in September 2020. In June 2020, they obtained a certification in Impromptu Speaking from LinkedIn. Additionally, Daniel obtained the U.S. Submarine Qualification certification from the US Navy in August 2007. It is unclear if they have obtained certifications in Certified Ethical Hacker (CEH), Certified Penetration Tester, Network+, and Security+ as the obtained month and year are not specified for these certifications.

Links

Previous companies

Avaya logo
Google logo

Timeline

  • Chief Threat Aficionado

    June, 2023 - present

  • Senior Manager Advanced Practices

    September, 2021

  • Manager Advanced Practices

    January, 2020

A panel showing how The Org can help with contacting the right person.