Work with thought leaders and academic experts from United States Marine Corps

Researchers on NotedSource with connections to United States Marine Corps include Thomas Pulliam, Jeffrey Samuel Schulman, Jr., M.S., CISSP-ISSEP, and Michael Brennan.

Thomas Pulliam

Houston, Texas, United States of America
Post-doctoral Fellow at The University of Texas MD Anderson Cancer Center with PhD in Cell and Molecular Biology
Experience

The University of Texas MD Anderson Cancer Center

Post-doctoral Fellow / August, 2021Present

University of Houston

Graduate Research Assitant / October, 2017May, 2021

Graduate Teaching Assitant / August, 2016October, 2017

Texas General Land Office

Beach Water Sample Analzyer / May, 2014December, 2014

United States Marine Corps

Chemical, Biological, Nuclear, Radiological Defense Specialist / August, 2008August, 2012

Research Expertise
Cancer
Molecular Biology
Cell Signaling
Angiogenesis
Metabolism
And 5 more
About
Thomas Pulliam is a highly educated and experienced scientist, with a strong background in cancer, cell, and molecular biology. He received his PhD in Cell and Molecular Biology from the University of Houston in 2021, after completing his BSc in Biology at Lamar University in 2014. He is currently a post-doctoral fellow in the department of Cancer Systems Imaging at The University of Texas MD Anderson Cancer Center. Throughout his education, Thomas has gained valuable research experience through various positions as a graduate research assistant and teaching assistant at the University of Houston. He has also worked as a Beach Water Sample Analyzer for the Texas General Land Office, where he honed his analytical skills. In addition to his academic achievements, Thomas has also served in the United States Marine Corps as a Chemical, Biological, Nuclear, and Radiological Defense Specialist. This experience has given him a strong sense of discipline, teamwork, and problem-solving skills. With his diverse background and expertise in cancer and molecular biology, Thomas is committed to making significant contributions to the field of cancer research. He is a driven and dedicated scientist, always seeking new challenges and opportunities to further his knowledge and skills.

See Full Profile

Jeffrey Samuel Schulman, Jr., M.S., CISSP-ISSEP

Ph.D. Student with over two decades of information technology and security experience in the highest levels of R&D and National Defense.
Experience

Penn State University

Cybersecurity Architect / June, 2019September, 2023

Cybersecurity Architect designing enterprise and research security systems for a $400m+ national security and intelligence research enterprise

Adjunct Faculty / January, 2022Present

I teach IST 220 Networking and Telecommunications resident classes – the largest cohort so far is 100 students

United States Africa Command (Contractor/GDIT)

Platforms Engineering Team Lead / January, 2011May, 2019

Led team of six engineers during development and integration of enterprise emergency alerting system, log aggregation and analytics, SQL consolidation, and cyber security readiness inspection. Senior Systems Engineer responsible for deploying a DoD-compliant internet-facing DMZ extension with vSphere cluster, NetApp Storage, F5 BigIP ADC, and SharePoint farm. Implemented over 3000 security controls and 20 STIGs. Complied with USG/DoD security requirements, including STIGs, SRGs, IAVAs, IAVMs, ICD, FIPS, NIST, and DIACAP/RMF controls.

Defense Intelligence Agency / United States Forces Korea Intelligence Directorate (Contractor/SAIC)

Senior Systems Administrator / July, 2003January, 2011

I managed five enterprise networks with over 2000 users; Senior SCCM 2007 Engineer, designing and integrating SCCM architecture on multiple networks. My responsibilities included system engineering, administration, maintenance, troubleshooting, backups, documentation, disaster recovery planning, and conducting technical interviews. Additionally, I held roles as a Senior Microsoft Exchange, VMWare, and SCOM Engineer, as well as an Active Directory, Terminal Server, TACLANE, and NetApp Administrator. I authored a DITSCAP accreditation package and ensured IAVA compliance and vulnerability mitigation. I coordinated inter-organization LDAP directory replication and provided support during military exercises. I also assisted with enterprise workstation refresh and offered tier II-III end user support.

United States Marine Corps

Small Computer Systems Specialist (Sergeant/E-5) / September, 1999September, 2003

During my active duty in the Marine Corps, I served as a Systems Administrator responsible for communications functions in Korea. I supported exercises and video teleconference capabilities at Marine Corps Headquarters in Palan. I performed system design, implementation, maintenance, troubleshooting, and backups. As a Systems Administrator for the Second Force Service support group, I upgraded network architecture and administered Windows NT 4.0 and Exchange 5.5. I also designed a remote access and data-at-rest system. Additionally, I played a key role in designing and supporting DMS and DMDS architecture. I trained over 200 users as message Releasing Authorities and provided messaging support for the whole organization.

Research Expertise
Dark Patterns
Active Inference
About
My educational career has been unique and non-traditional. I started kindergarten when I was four years old, just meeting the deadline for admission in that cohort. I subsequently attended every school type imaginable: public, private, parochial, charter, and homeschool. I graduated a year early, at sixteen years of age, and joined the United States Marine Corps three days after my seventeenth birthday.  Upon completing basic training and primary specialty training, I immediately initiated a request to attend night school using USMC tuition assistance benefits. My immediate leadership denied the request several times, but I persisted and continued petitioning the chain of command until I got direct approval from the battalion commander. I concurrently continuously self-studied and ultimately earned fifty-nine undergraduate credit hours through non-traditional methods – CLEPs, DSSTs, and military education. I completed my Associate degree in under two years and left active duty at twenty years old, having finished all but three classes toward my undergraduate degree. When I left the organization, nearly a third of the junior enlisted personnel had enrolled in classes.  Immediately after finishing my bachelor’s degree, I attended graduate school on nights and weekends while working a full-time job, earning a Master of Science in International Relations with a concentration in National Security Policy. Some years later, I also leveraged my remaining GI Bill benefits to complete another master’s degree in Cybersecurity Technology.  I spent most of my adult life overseas as a member of the military and a civilian contractor supporting the military mission. My growth and advancement over my career are largely due to the skills and attributes that I was fortunate enough to learn and develop in the Marines.  As the Cybersecurity Architect for the Penn State Applied research lab, I was involved in countless enterprise initiatives and over half a dozen separate research projects. I care deeply about the global importance and impact of our research and development efforts. I’ve also started collaboration efforts across the university, creating the Open-Source Program Office (OSPO) working group and the cybersecurity collaboration group. In addition, I’ve just begun working on a proposal, collaborating with several PSU organizations (CSRE, ARL, IST, ITS, and Libraries) to attempt to establish our OSPO to make a world-class open-source software center of excellence. One intended focus of the program office is to create reusable standards and templates for consumption and replicability across academia. The program office would also simplify the mechanism for open-source software contribution approvals, outreach, and coordination throughout the university.  As a member FFRDC/UARC information security working group, I've worked on some of the most complex security challenges in the Department of Defense and the Defense Industrial Base. I am also an active member of several other professional organizations, including (ISC)2, the New England Complex Systems Institute, the Association of Old Crows, and the Military Cyber  Professionals Organization. I also regularly attend and participate in cybersecurity conferences, including DEF CON, Security Congress, InfoWarCon, and HammerCon.

See Full Profile

More Information About United States Marine Corps