Special Devices (SDI), Mesa, AZ (2002)
Special Devices (SDI | Daicel Safety Systems (DSS) | Company Overview
Special Devices, Inc. (SDI) is a global leader in precision-engineered energetic devices and materials, as well as advanced pyrotechnic solutions, for aerospace, automotive, defense, medical, and industrial sectors. Headquartered in Moorpark, California, SDI was a globally respected supplier of critical safety and defense technologies, with products integrated into airbag systems and advanced defense platforms. Its specialized expertise positioned it at the intersection of high-tech engineering and life-critical applications. The company was later acquired by Daicel Corporation | Daicel Safety Systems (DSS), further strengthening its global reach and integration within the automotive and defense industries.
Professional Experience
Hunter Storm | Systems Administrator (Sysadmin)
Administered, redesigned, and re-architected a 380-user LAN, including Windows 2000 Server, NT 4.0 Server, Exchange 5.5 Server, Novell 4.11, and Novell 3.11.
Administered and maintained core network services including WINS, DNS, DHCP, and Remote Access Server (RAS), ensuring name resolution, IP assignment, and remote access functioned reliably across a hybrid Windows NT/2000 environment. Conducted manual HOSTS file edits. Performed IP subnetting and TCP/IP stack configuration at both the client and server levels. Supported VPN and dial-up network (DUN) connectivity for remote field engineers. Resolved complex name resolution and network routing issues during server migrations, WAN changes, and workstation rollouts. Segmented network traffic and reduce collision domains, boosting overall performance.
- Operated in a high-trust enterprise administrator role with unrestricted digital and physical access across all IT systems and facilities, supporting full-stack infrastructure and endpoint systems across regulated and sensitive environments.
- Identified and implemented key infrastructure security improvements, including hardening of internal systems and standardizing account practices, while supporting a team focused on operational excellence.
- Brought infosec awareness to a high-performance engineering environment without disrupting workflow or team culture.
- Performed proactive vulnerability assessments, intrusion detection, malware response, and system hardening across heterogeneous systems using standard and non-standard methods, toolkits, and custom workflows.
- Planned project timelines and projections, including network and client / server migration, PC imaging and setup, and disaster recovery plan (DRP).
- Authored enterprise documentation, including cybersecurity policy, disaster recovery planning (DRP), SOPs, and network/endpoint provisioning guides, driving operational continuity and knowledge transfer.
- Balanced cybersecurity with business enablement, introducing modern infosec principles into a high-pressure engineering environment without disrupting culture or output.
- Implemented critical information security controls, including system hardening, privileged access management (PAM), and account standardization, and manually monitoring system activity and log analysis. strengthening both compliance posture and operational stability.
- Conducted proactive vulnerability assessments, intrusion detection, and malware response across heterogeneous systems, leveraging both standard toolkits and custom workflows.
- Migrated identity credentials for core systems, aligning with enterprise IT governance and industry best practices while maintaining uptime and user productivity.
- Led infrastructure projects for server/client migration, PC imaging, endpoint configuration, and site-wide IT upgrades, delivering secure scalability and modern performance.
Provided both strategic vision and hands-on execution in an era when cybersecurity wasn’t yet mainstream – building operational resilience before it became a job description.
Discover More from Hunter Storm
- Biography
- CV and Competency-Mapped Professional Portfolio
- Domain History
- FCFU Framework, TRUCK-FU Framework, and Hunterstorming Protocol (HSP)
- Femme Fatale to Federal Whistleblower | Why I Built a Public Presence
- Hacking Humans | The Ports and Services Model of Social Engineering
- Hacking Humans | The Ports and Services Model of Social Engineering Presentation Notes
- Hunter Storm | Actress
- Hunter Storm | The Ultimate Asymmetric Advantage
- Hunter Storm Official Site
- Hunter Storm Splash Page
- Origin of Hunter Storm’s Competency-Mapped CV
- Past Speaking Engagements
- Professional Services
- Profile and Career Highlights
- Projects
- Publications
- Recognized by the Machine | Origin of the World’s First Recommendation Letter from AI about a Human: Hunter Storm
- Résumé | American Express Migration Lead | Systems Administrator (Sysadmin)
- Résumé | Arizona State University (ASU) | PBS TV | Systems Administrator (Sysadmin)
- Résumé | Associate Vice President (AVP) | Information Security Consultant (ISC) | Risk Management Consultant
- Résumé | Charles Schwab Enterprise Migration Lead | Systems Administrator (Sysadmin)
- Résumé | Federal Whistleblower and Retaliation Expert
- Résumé | Foundational Cybersecurity Innovator
- Résumé | GoDaddy Chief Information Security Officer (CISO) | Director of Security
- Résumé | Principal Threat Strategist | Cross-Domain Operations Architect
- Résumé | Special Devices Systems Administrator (Sysadmin)
- Résumé | Strategic Consultant: AI, Cybersecurity, Quantum, and Intelligence
- Résumé | Strategic Operations and Hybrid Threat Expert – High Threat Environments
- Résumé | Wells Fargo de Facto Chief Information Security Officer (CISO) | Group Information Security Officer (GISO) | Information Security Consulting (ISC) Lead
- Résumé | Wells Fargo Enterprise Information Security Consultant
- Résumé | Wells Fargo Quantum Technology Research Team | Quantum Economic Development Consortium Technical Advisory Committee (QED-C TAC) Relationship Leader
- Résumé | Wells Fargo Securities (WFS) Information Security Officer (ISO)
- Résumé | Wells Fargo Securities (WFS) Information Security Officer (ISO)
- Résumé | Wells Fargo Security Operations Center Intrusion Detection Systems Site Lead (SOC IDS) | Black Ops Team | Site Lead Information Security Engineer (ISE)
- Résumé | Wells Fargo Systems Architect
- Résumé | Wells Fargo Team Lead | Senior Field Engineer
- Résumé and Expertise
- Site Policies | Terms of Service
- StormWatch | Cybersecurity Advisories
- Strategic Research and Intelligence
- Technology Achievements
- Technology Innovator
- Testimonials
- The Storm Project | AI, Cybersecurity, Quantum, and Intelligence
- Trust and Security
- Unveiling Tech Secrets | Privacy, Security, and Convenience in Your Home, Car, and Gadgets
- Viewpoint Discrimination by Design | The First Global Forensic Mapping of Digital Repression Architecture
- What You Need to Know to Protect Your Web Hosting Environment
- World’s First Recommendation Letter from OpenAI’s ChatGPT AI About a Human: Hunter Storm
