John B. Baird


Computer Forensic Portfolio

Bradenton, FL

Open to relocation


johnbairdpc at gmail dot com


Jump to








Bachelor's of Applied Science, Computer Forensics


 Champlain, 2018


Books Read

Real Digital Forensics Computer Security and Incident and Response - Keith J. Jones, Richard Bejtlich, Curtis W. Rose


Computer Forensics and Essential Guide for Accountants, Layers and Managers - Michael Sheetz


Essentials of Criminal Law - Neil C. Chamelin, Andrew Thomas



Criminal Justice Today: An Introductory Text for the Twenty First Century - Frank J. Schmalleger


Criminal Investigation Basic Perspectives - Charles A. Lushbaugh, Paul B. Weston



Constitutional Values: Governmental Powers and Individual Freedoms - Daniel E. Hall, John P. Feldmeier


State and Local Government: The Essentials - Ann O’M. Bowman, Richard C. Kearney



Managing eDiscovery and ESI: From Pre-Litigation to Trial - Michael D. Berman, Courtney Ingraffia Barton, Paul W. Grimm


Information Security Principles and Practices - Mark Merkow, Jim Breithaupt








John B. Baird

Bradenton, FL 34207 • 941-363-1144 • johnbairdpc at gmail dot com



Open to relocation with ten years of information technology experience. Proficient with a variety of IT tools and techniques used in collecting, analyzing and reporting on electronic / digital evidence of criminal cases. Available for security clearance, effective communicator and a fast learner of new emerging technologies.



Bachelor’s of Applied Science, Digital Forensics

Champlain • 2019 • GPA 4.0 / 4.0



Forensic Techniques: Evidence preservation, imaging, hash computation, evidence investigation, network analysis, intrusion detection, eDiscovery, file carving, signature analysis, encryption, stenography, legal precedence, forensic report writing, EnCE EnCase Certified Examiner (in progress)

Forensic Tools: EnCase (Enterprise), FTK, Oxygen Forensics, WireShark, HashTool, Backtrack, Autopsy, Snort, Cellebrite, XRY, Volatility, FTK Imager, RegRipper, Oxygen Forensics

Malware Techniques: Hash identification (static & dynamic), virtual sandbox creation, command & control (C&C) identification, incident of compromise (IOC) / attack vector analysis, registry shellbag examination, report writing

IT Techniques: Adding and removing hardware, building PCs, network cabling, racking servers, router and switch programming, VoIP installation, malware / virus removal, operating system installation, virtual machine imaging, account permission managing, Windows PowerShell, macOS terminal

IT Tools: VMWare Enterprise, Exchange, MySQL, TrueCrypt, Lotus Notes, Avaya, Merlin, VMWare Fusion, Google Apps, McAfee Virus Scan Enterprise, Bombard, BMC Remedy ticketing, FakeNet, Microsoft Attack Surface Analyzer, NetworkMiner

• Operating Systems: Windows, macOS (OS X), Linux Ubuntu, Linux Backtrack, TailsOS (Linux), iOS, Android, Windows Phone

• Programming Languages: C#, Python, Java, PHP, HTML, Swift



John Baird PC, Bradenton, FL • Digital Forensic Consultant, Self-employed • 2014 - Present

Advise clients, including law firms and physician groups, whether a situation they were involved in would benefit from digital forensic examination. Provide clients with a written report detailing if a forensic examination would be beneficial or hurtful to their legal situation. Forensic consulting experience includes employee sexual harassment to intellectual property theft.

Learning iOS Forensics • Book Contribution, Packt Publishing • 2014 - 2015
Assisted authors Mattia Epifani & Pasquale Stirparo with their mobile forensic book, "Learning iOS Forensics", published in 2015. Areas of contribution include iOS version differences, iPhone hardware encryption details, Jailbreaking history / techniques and mobile examination general techniques (Cellebrite).

Intern, IT Technical Institute • Computer Forensic Examiner • 2011 - 2012

Performed digital forensic tasks on criminal cases under supervision through college including verifying hash values (MD5, SHA-1), compiling information for § 2703(f) subpoenas of internet companies (Google, Verizon), examined images using EnCase and FTK, HashTool, RegRipper, FTK Imager and compiled forensic reports. Recovered hidden and deleted data and worked with encrypted evidence using TrueCrypt. Network forensic examination was completed using Linux Backtrack, WireShark and Snort on a criminal case involving network intrusion of a Linux server.



John Baird PC, Bradenton, FL • IT Technician, Self-employed • 2002 - Present

Professionally serve technical needs of residents and businesses for companies such as Raymond James Financial Services. Work with operating systems such as Windows, Windows Server, macOS (OS X), Linux, iOS, Android and Windows Phone. Create tailored training for individual users as well as groups using PowerPoint, Keynote and Google Apps. Consulting companies on future technology deployment. Install various wireless and wired networks using products from HP, Cisco, Dell and Apple. Perform threat assessment and implemented security against malware and viruses using products such as F-Secure, Malware Bytes and resources such as Virustotal. Install hardware upgrades, repairs and built custom computers.

Intern, IT Technical Institute • Malware Analyst • 2011

Analyzed a criminal malware incident under supervision through college involving a keylogger malware variant. Created safe sandbox environment in a VMWare virtual machine, identified possible incidents of compromise (IOC's) using ProcessMonitor, ProcessExplorer, Microsoft Attack Surface Analyzer. Used HashTool to generate SHA-1 hash value for malware identification, identified the command and control (C&C) server using FakeNet, NetworkMiner and compiled a malware analysis report.

Wells Fargo, Lakeland, FL • Contractual Network Administrator • 2011

Administrated on-site network support and server racking for Wells Fargo branches in multiple cities throughout Florida for Wachovia-to-Wells Fargo transition, contracted through Robert Half Technologies. Physically uninstalled rack servers, rewired patch cables, organized patch bays, ran PowerShell scripts, software and driver updates on new servers from brands such as HP, Cisco, Lenovo. Used Lotus Notes for notation and utilized MySQL for SQL management.

Smith & Nephew, St. Petersburg, FL • Contractual Incident Response & Help Desk • 2011

Supported incident response team during a zero-day malware outbreak affecting computers of 300+ enterprise users connected via WAN, contracted through Robert Half Technologies. Worked with BMC Remedy ticketing system and McAfee Virus Scan Enterprise to follow the instructions of incident response lead for removing infection and / or restoring clean images of Windows. Also served as help desk support, primarily connecting Avaya VoIP phone hardware and infrastructure.

AOL, Tampa, FL • Help Desk Support Tier III • 2010 - 2011

Effectively provided tier 1, 2 & 3 technical support, contracted through Computer Generated Solutions, for AOL server and client user issues using software VoIP Avaya, document using Lotus Notes, remote desktop management and virtual machine tools. Utilized Bombard for remotely controlling computers, Merlin for database entry and VMWare Enterprise for remotely running tools. Operated in a fast-paced, metrics-driven environment ensuring no customer privacy violations occurred and quality assurance guidelines were met every week.



Jump to