


Jennifer Funk is a Cyber Threat Intelligence professional specializing in analyzing threat activity and translating complex data into actionable insight. Her work includes evaluating dark web data, tracking adversary behavior, and mapping real-world threats to support defensive operations and strategic decision-making.
​
She collaborates closely across functions including threat hunting, vulnerability management, and incident response, ensuring intelligence is integrated and operationalized effectively across security teams and key stakeholders.
​
With a background in the military police corps, Jennifer brings a structured, disciplined approach shaped by real-world experience in risk assessment, situational awareness, and protection, foundations that continue to drive her work in the cyber threat landscape.
Jennifer Funk
Founder of AltFunktion

Highlights
Explore highlights, key contributions, and professional milestones. I believe that continuously building community, and challenging yourself to teach and learn in new way is key to professional and personal success. This section reflects work across collaborations, content development, and certifications, with added context and insight into the experience behind each.

CompTIA Collaborations
Developed video training for CompTIA's DATA+ and CySA+. 2024 had the pleasure of visiting CompTIA HQ to work with other professionals and build community for cyber education.

Just Hacking Training
Collaborations
Created Upskill Challenges for John Hammond's Just Hacking Training platform. This training platform hosts a number of industry experts to provide cybersecurity training.

BSIDes GVL
Speaker at BSidesGVL 2024 in collaboration with Bailey Marshal to address digital youth safety. 2025 BSidesGVL Board member.
Advanced Certifications



The GIAC Cyber Threat Intelligence Certification (GCTI) provides a strong foundation in intelligence analysis within a cybersecurity context. It covers key concepts such as the intelligence lifecycle, structured analytic techniques, and the application of frameworks like MITRE ATT&CK and the Diamond Model.
​
The certification reinforces how to move from raw data to meaningful intelligence, with a focus on producing analysis that supports both operational and strategic decision-making. Currently there are not many training courses for Cyber Threat Intelligence, making the GCTI my #1 recommendation for certifiable CTI training.
The GIAC Continuous Monitoring Certification (GMON) focuses on building and maintaining effective continuous monitoring programs within modern security operations. It emphasizes visibility across networks, systems, and endpoints, enabling early detection of suspicious activity and supporting proactive defense. The certification reinforces the ability to identify gaps in monitoring, improve detection coverage, and align monitoring strategies with real-world threat behavior. While the GMON is not focused on CTI specifically, it gave me great insights into "We know what the threat is, and this how we can work across teams to mitigate risk."
The GIAC Certified Incident Handler (GCIH) provided practical insight into the tools, techniques, and methods attackers use in real-world environments, while also reinforcing how defenders detect, investigate, and respond to that activity. One of the most valuable aspects of this certification was the focus on hacker tradecraft, understanding how attacks are carried out, what they look like in practice, and how incident handling supports effective defense.
For Cyber Threat Intelligence, this course provided great insights into how the attackers carry out their operations from a technical perspective.

The GIAC Strategic OSINT Analyst (GSOA) certification focuses on advanced open-source intelligence (OSINT) tradecraft, with an emphasis on conducting real-world investigations at scale. It covers areas such as dark web analysis, data correlation, automation with Python, and tracking adversary activity across multiple data sources including social platforms, blockchain, and disinformation networks.
​
What makes this certification stand out is its focus on applied intelligence, moving beyond data collection to connecting, analyzing, and operationalizing information across multiple layers. It reinforces how to investigate, pivot, and build a complete picture of adversary activity while maintaining operational security.
​
As a newer certification, it represents a more modern approach to intelligence work, emphasizing scale, automation, and real-world investigative capability rather than surface-level OSINT techniques.
Book Club
I believe continued education—both in technical skills and personal development—is essential to becoming a well-rounded, adaptable professional. Below are a few books I’ve personally read and recommend, each offering either valuable technical insight or helping shape the way I think and grow as an individual. The more intentional we are about how we think, and the more we continue to learn, the better positioned we are not only to support our own growth, but to lead and uplift others as well.

Self Development
Self
Development
Technical
Skills
Technical
Skills
Self
Development
Technical
Skills