updating generation code to straight JS
This commit is contained in:
71
2025/Head-of-SOC/Phillip_Tarrant_Resume.pdf
Normal file
71
2025/Head-of-SOC/Phillip_Tarrant_Resume.pdf
Normal file
@@ -0,0 +1,71 @@
|
||||
%PDF-1.7
|
||||
%<25><><EFBFBD><EFBFBD>
|
||||
1 0 obj
|
||||
<</Pages 2 0 R /Type/Catalog>>
|
||||
endobj
|
||||
2 0 obj
|
||||
<</Count 3/Kids[ 4 0 R 10 0 R 12 0 R ]/Type/Pages>>
|
||||
endobj
|
||||
3 0 obj
|
||||
<</CreationDate(D:20251208124202)/Creator(PDFium)/Producer(PDFium)>>
|
||||
endobj
|
||||
4 0 obj
|
||||
<</Contents 5 0 R /MediaBox[ 0 0 612 792]/Parent 2 0 R /Resources<</Font 6 0 R /ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/Trans<<>>/Type/Page>>
|
||||
endobj
|
||||
5 0 obj
|
||||
<</Filter[/ASCII85Decode/FlateDecode]/Length 1829>>stream
|
||||
GatU3gMYb8&:O:Sb_lM"Po,[YDLJNo.u42I<[9#/!Pb_X-+,J<bNpj`W9D9GG'Sp\0Jo4bJ4/gBk00>UZgtoNO(Z5&*8k*.Dr5p"q%+n2"\o'V)OB@$f*ecg3M!usmc.arF7#>g06!E4SqMH24N.PDAkqlEF+tK)SZs-lF;VpGp;:XY?>Uijlun<An-t%X+T)CtcW6amO8+!<H9-5NnX&:"OjiW\?TEhe>RSe;FgVfZ1*u\q_HXPEVGk">R_"^[2rN#7iFFtf<MP6p;A--^:NOB.-PC\^^1R;*`[h$-AG1k"1\[4*\&Eo0)(UI7`aNt8TX)DeM/;NgZoaA[5rJX/A:>Kd^d=MnBHNOu)n:5*qrRLKh(&=1m^C<p,$`s[mbrJ;)_Q@(%rCt:mFanfhpq9ng_HtU0DdjQc_f!`_rJ!`WlBPLnMKH'`a2<4C!%VB4GEreWM/7SVbnn25/CMjE<-_X5t4F>,oi=:JFEIE-VC09Oamlscu6FY;'&S]'S/T.-d#Y<P"%dXAj)UD.M4FK4GEai2;gsq9$CV]!OJ1m))7:SZ(h/Q8\oJj[;oXsOc7;'T4jd2XX"Nni_;ZG(aCsqAi@I;M*[,Vka=0*W-i&f9I'r@bYpA!V'Y6&5#?,4Hn@pEn-9^9<LQ$\9HA*7$r0*F)5lBJ5_nls1=E"p%d^,Dco#F$+?[GI`;%e4AUiG>CS?h@11hiOn^J`dI3?,/`d!/XWlC$\9c2Sr`^csMcRp`lQWQtl3\)dY_I;S5@XuRq_'Cn'=D,Wa,e00,U""<6DY1r8XYH$l+m)N0bnG&r0e8V*$E4_0I;iS.Ec"9S^KPLZkgX'#J=H9`r72,F<'s>:N=8(2@Au[jl=V0IFq-&d%-u[fB/Lu\bqb6#iUkYd0__,@7i__r8N$L)-B23>Xi^XmNk&;4b<qbc[KN`fM.NP]:uL4)Vrg-N0rE#'o`!!Wr@s=.[ZW*[]RSDrp=SbQg@$V!YIenY(bU)+;G862Qjq7lb:Q)!(m^X\7##qHHHuq/TrBB73]^HNe3s6`jC=@0UTFQ[,\ASD1!S5>Cc+)&1CUg6l;*Jmh(hH@YJ4Z@@9qLW2r7-_e.:RJ1SN2D'7tu6=<\>W$F.TM@7d#r&4e@0QAuMJU!un;NYt#J>A$/XKtr[)o`?2Zgs/YM)Gg2k8KZkP1p+h2dS)bGf:GX,9eCpdI)4]9cJF*kRS^.8ljJDj;AB43=VRfd\CBN>aRBi0L7(VqkiZ.($TJuI2PQ?&of&U/^_L]@c.$\M<Dh/;13sJ'bD[\:>4OS),O;I*DP]lMlGieQ8(?mh6@#U5UIA%6,r()c*Eo[6VPIWr5=Eibe/3]/MT59S>f9F^kW&Nq$o=tJ;`m<_2Q]5EN>Yq37c=pdThJN*R-'5#[&l)LgshSWMb6/$7q\s3(TTdf8u>t;eUQ&r<dV($0>86.Xds`7IOu/s[CJ-$<G#f!kgrRZ2!WR)hjse[VS"E^VU+IL/e^ZCZjC%`-71=>_:Z`=O(Qca2&?Wm+1"mg-OQ`;OH^Wsen<A)m'`QT<kc^9Da*Jd&T@NgIC'sQcun-ZT46Tn@oHh.M.T;?(u+mG4\R<.\RKoqe\f@@8._jXFkAMU+>Pu3e'X;2:te`^:\nHUFRdBmeg,a$ae6K4>(]j\980X$om-]D/$O/8g93$`ACRS/hIumQFN%KRcVl=tM/uRF]l#^Z:l<LN1,i<7IDSfhD-H<AZtXtYN#E;.DGa#u,rmTQf5p<)3`X/:ru=8*.N;p&OB+>>%'dLq<qe&lm_7^FRiYrbO-mf3@4'2?J@M>.;:WKU,.&197t!Fc28(-q22gGQ?gamS('~>
|
||||
endstream
|
||||
endobj
|
||||
6 0 obj
|
||||
<</F1 7 0 R /F2 8 0 R /F3 9 0 R >>
|
||||
endobj
|
||||
7 0 obj
|
||||
<</BaseFont/Helvetica/Encoding/WinAnsiEncoding/Name/F1/Subtype/Type1/Type/Font>>
|
||||
endobj
|
||||
8 0 obj
|
||||
<</BaseFont/Helvetica-Bold/Encoding/WinAnsiEncoding/Name/F2/Subtype/Type1/Type/Font>>
|
||||
endobj
|
||||
9 0 obj
|
||||
<</BaseFont/Helvetica-BoldOblique/Encoding/WinAnsiEncoding/Name/F3/Subtype/Type1/Type/Font>>
|
||||
endobj
|
||||
10 0 obj
|
||||
<</Contents 11 0 R /MediaBox[ 0 0 612 792]/Parent 2 0 R /Resources<</Font 6 0 R /ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/Trans<<>>/Type/Page>>
|
||||
endobj
|
||||
11 0 obj
|
||||
<</Filter[/ASCII85Decode/FlateDecode]/Length 1739>>stream
|
||||
Gat=,?#uJp'Re<2\1aCEG@D@BpuAVRdN-XlD79.J?5/Je)^,ebfM-ko*W^GQ0#:\OB<Ws5EmMG^S9pfg!kcD4R[-@6f(@pB87=pP%>F=3VY(b:?CsBPL#(&-S7[?0N4#<]1\hoKKnh&7Cl,&`%SuW@3+%*GUaokulEm7s.%8P[0!"iR():+=h/d(O=rZFlkjCP?U'\8%nK-T$Io#B[B`3\sj);S:KJK)o`fUeop[r(EY.kaJO/d$$##1>EO)bqnK>fZ>BYC24]5T['<QZT5a@F!"\tj:;:/caW9>Qn"`)<A4V6ZC^<0G^r)^fUGd]O/Vc@8eeAO>L#F7oK`Y!+LY`<oU7Zdag`hr>*5^M:=4MNllc+RF?5de(>8icb;#_/>r!<GFM"*En-*&WYZTl"e^VT>,0X^S@o=5cQTh1=aN^.5L%=<Ym_C;NKCJlV*j1e5YN=i]Wt+SMgutWHY-g-VEp83B<$WS;a@/Ga%rt>sAM](Ea0"UC,N"MOH;\2RQ/*1ea(mX<aK;=Z=ku:+k`lNi]MB<m^?!B;16S\B9Nbgk.cJ6je$QNn#nQc,]E>Ce<EbT7ZGLBP?)%Tpq+&jbOXn]cb#AE+M<s3XAJ*"UtgohUYT`>??!;18UH9<Qq;YIjtasH_TSUPt+*ZI<811K,T_Ua*2<@<i;l#rrEg?73fp`>bWR1L&cXp+)fbAKr\?X:pskg.h8i@)o4JA/`L9bN8mD,Op::OlZROV:_`UA:D+X%Sfppd"N^nKST"a<Nbg9e-coMGC)/Kq&FF);\g9n*3M&H@F>a9S%W@=,4Xd:04p%aI3]j$-[Zqg8'efE#-([QC[dq#kYBa;"mtZ#&'Nk,GmghMKT+$'rS0YeF&BBuC;]$q!VclV])dTL\:Bcegp$EN:g&"gj*7R7KPS.G\l.*'lERGCC_^^ej7R"+tIai0nnWTp'"6(^Gp4*/lhVMXI,&@!_3AYAh5oH'<=<'Lj0Y6hhciR\0Q74I:<(]>W8,eflRJ/%na'm<s@PU1$U9E8^&Q5Tn/!*Y1TLV!DRknTaigo"E"/+m_gn4qL#D2^k$=g(/:!K$%;iBO[YF3L]Z0KUm#4YE"8[%>*8U/Cbd7kGfi?/p+PC$%2Lnk>RW%D2OaP6]Gr1fBVIMb%,<`EZ5kig-_`!1ItDoTZ2$dtph7Lb^UL-CPK%XQYi$',K0YGg?;>B/,,YO7HZT^_Sh9jkY<[t5,O_2#p[Nu#'._+4+XAAP`".5IMf?"_JHOmPN<%>W-DY,#_j[22.g`"g/c[eQO0'@7e:!E\H^KC+d%+I^9_i^ZU9(B5,Y,$/*n[F6Gn!1@mZI6^<@W7l:7"*h8,/_^eU+I&24Zk+O38r04*8!ZAT=B.iEj@j\PTi\k/o7Cj5QVFhoQ_;Pb#Y&KC_J91YRG1NkBSr1!>euor6OecAH)Tpm$C/'6W5IQ1=g-2I+?@!EJ*"67HiV1LaVeV\!?gD82"AI.g%sRB&[2o^Mc.nRp;)Y=gZ%o\PJTcDX5IqX5=r]4,f9IR`7Nh@gM1u40P5PP=Ao^G?N3P(VVkmRZ3M*b_DqE,*DVX=ol$Q'6-EXnUInKVZJmO%h)#;W9[6/B=*%OsYAYQ=gcKGPOL?$a,FOVhL\NQnSugn3#O-Q<J$h'PV@p7&bf$)?qu5u$8^4PAkrTA8i!7jfou!H++H*_UB=NS,bSEq%[GZ;[[G-*o05B#Im4Ws=Pg.GI4J<bW)6]Nb@i"b8^B$Cm(Ob)11]~>
|
||||
endstream
|
||||
endobj
|
||||
12 0 obj
|
||||
<</Contents 13 0 R /MediaBox[ 0 0 612 792]/Parent 2 0 R /Resources<</Font 6 0 R /ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/Trans<<>>/Type/Page>>
|
||||
endobj
|
||||
13 0 obj
|
||||
<</Filter[/ASCII85Decode/FlateDecode]/Length 1014>>stream
|
||||
Gat=j968Q9'SZ;['mIJJ/Z#H(G*aQJOeFH44ET&3,2YAS[M0uID>l]M<`09L>f_00MecJpma4%XIIQIkq`A]rhA(!UiI`4;YlI"W6r7.+H#`?6^u(/G1J#2s0\*hMVQ0fFc$u1=hJHqln7e2+Nl1*nNZ,VUDmceg31#nl8<pe087<hsC9FA/R^B/No1-N*Z9l&_$p6bL5tTu<hVHQk']5U/dkQ9JlSksl$R\51p1HP]?2Xq9lJ(W]K:_k`:K+dC&qjMbZ(b].-u!(_1c0&d`Q;!q$X>P>XVtWp!976#"/R\PMg9+&AX$u(Q#*BPH7hjpa;QiPm3D-lpjkW'bglIOj#sQM<\"4qI$@*>+DQpJX3nS6L=Hf.,6>)r@t^P2N*F-1B-$X2$`n*OR4EF[!dg;0Os0NAG4e#N$dHa/jVEkeZqIOTC'hO1<]*\Bpdc`PlQDhm=gRo3b[g?^J2tn1=8tL_(W_q@E,tJMeE]jspdjW!cKq0@M[S_6f_M!64mM>m*HH:mCfC*fOq[;NQok.WSt6\d)U'gnA.8F\h4a!PK<]6tJ-TML,U[+M1rLe6IWiOBZKePSWb`ZG%43hWQgC24Ve)4;Kk?RUQJ8iTr"Z!g<q7iD;3o^c`(F1kg2\fp_"fE`Xe,A1B+L0A'ZU*[\8M^iYsqI[Y@?t<0l2s9H38o(8PTBZ%;;Q-nP3?>>,,7q&HtP)a2YX.&D^Ya8H>ON[Vp&r%5/\0A<_i/JW*hQ6#UOR,O=)D03d:+3qgfH:'Le87F=='l4<-"@hbhp7+/9eLa3"K6MmGJ4lg0!A@LCg:bH/5KI2`e##eORfH2<b`.Q7&Hou%=34.P)2nI_\1/1VMYn0Y[1\T3M9*Z[SVX`LT\X_b[\@g()$7EnHc66Psl7EP%TZ!C1"W_HY7gYAm0F2),ll?4!35*BRi5KT;cJ97#MA,f<L(8jB]hb"IcKo<?42OEX#<#i7Y#2s,Nh6c,4nOnc]\_[Bl'J-3jcCRFI5s:AaoDZ2!V-bC7K~>
|
||||
endstream
|
||||
endobj
|
||||
xref
|
||||
0 14
|
||||
0000000000 65535 f
|
||||
0000000017 00000 n
|
||||
0000000066 00000 n
|
||||
0000000138 00000 n
|
||||
0000000225 00000 n
|
||||
0000000396 00000 n
|
||||
0000002314 00000 n
|
||||
0000002367 00000 n
|
||||
0000002466 00000 n
|
||||
0000002570 00000 n
|
||||
0000002681 00000 n
|
||||
0000002854 00000 n
|
||||
0000004683 00000 n
|
||||
0000004856 00000 n
|
||||
trailer
|
||||
<<
|
||||
/Root 1 0 R
|
||||
/Info 3 0 R
|
||||
/Size 14/ID[<F9B98603F188DAF209E01A59031F93DD><F9B98603F188DAF209E01A59031F93DD>]>>
|
||||
startxref
|
||||
5960
|
||||
%%EOF
|
||||
162
2025/Head-of-SOC/Resume.md
Normal file
162
2025/Head-of-SOC/Resume.md
Normal file
@@ -0,0 +1,162 @@
|
||||
# PHILLIP TARRANT
|
||||
|
||||
**Head of Security Operations | SOC Director**
|
||||
|
||||
Morrison, TN | (706) 294-6733 | ptarrant@gmail.com | [LinkedIn](https://www.linkedin.com/in/phillip-tarrant-cyber)
|
||||
|
||||
---
|
||||
|
||||
## PROFESSIONAL SUMMARY
|
||||
|
||||
Results-driven Security Operations leader with 20+ years in cybersecurity and proven expertise scaling SOC operations in high-growth MSSP environments. Successfully grew SOC client base by 225% while managing a team of 17 direct reports and improving operational margins from 18% to 52%. Hands-on leader combining strategic vision with deep technical expertise in SIEM, SOAR, DFIR, and threat detection. Track record of building operational structure through SOPs, playbooks, and automation that drove 47% automated ticket resolution at scale.
|
||||
|
||||
---
|
||||
|
||||
## CORE COMPETENCIES
|
||||
|
||||
| SOC Leadership & Operations | Technical Expertise |
|
||||
|:---------------------------|:-------------------|
|
||||
| Team Building & Development (17+ direct reports) | SIEM: Splunk, Sentinel, ELK, Stellar Cyber |
|
||||
| SOC Scaling & Growth Strategy | SOAR: Swimlane, D3, Torq |
|
||||
| Playbook & Workflow Development | EDR: SentinelOne, Defender, Darktrace |
|
||||
| SOP Creation & Process Design | DFIR & Malware Analysis |
|
||||
| KPI Development & Metrics Reporting | Threat Hunting & Detection Engineering |
|
||||
| P&L Management & Profitability | Python, PowerShell, Automation |
|
||||
| Vendor Management & Negotiations | Cloud Security: AWS, Azure |
|
||||
| Executive Communication | NIST, PCI-DSS, HIPAA Compliance |
|
||||
|
||||
---
|
||||
|
||||
## PROFESSIONAL EXPERIENCE
|
||||
|
||||
### Senior Information Security Consultant
|
||||
**Confidential** | Remote | January 2025 - Present
|
||||
|
||||
Contract consulting providing SOC leadership and cybersecurity expertise to multiple organizations.
|
||||
|
||||
- Served as interim SOC Director at ATS Cyber Security Services, restructuring SOC workflows and elevating team capabilities through targeted training programs
|
||||
- Currently leading SOC operations for US Defense Space market supplier across multiple Microsoft tenants and international locations
|
||||
- Managing full SOC lifecycle including alert triage, DFIR engagements, and vulnerability management
|
||||
- Designed and implemented automation operations including SDLC processes and deployment pipelines
|
||||
- Managed enterprise Vulnerability Management Program for major fintech client using Qualys, building custom reports and automation scripts
|
||||
|
||||
---
|
||||
|
||||
### Director of Automation
|
||||
**Compuquip Cybersecurity** | Doral, FL | June 2024 - December 2024
|
||||
|
||||
Led Automation Team to transform SOC operational efficiency through intelligent automation.
|
||||
|
||||
- **Built automation infrastructure handling 3,500 tickets weekly with 47% closed without human intervention**
|
||||
- Designed, programmed, and deployed AI-powered tools using custom prompts and logic engines for security automation
|
||||
- Spearheaded new automation architecture using Python, AWS Lambda, and SOAR platforms
|
||||
- Drove team development in automation workflows and modern SOAR technologies
|
||||
- Created custom heuristics, filtering rulesets, and rule engines for automated alert triage
|
||||
|
||||
---
|
||||
|
||||
### SOC Director
|
||||
**Compuquip Cybersecurity** | Doral, FL | March 2023 - June 2024
|
||||
|
||||
Directed Security Operations Center serving MSSP clients, overseeing all SOC, Red Team, and managed services operations.
|
||||
|
||||
- **Scaled SOC client base from 16 to 52 customers (225% growth) through service expansion**
|
||||
- **Improved SOC profitability from 18% to 52% margin (80% in peak quarter), contributing to 15% annual net income growth**
|
||||
- **Managed team of 17 direct reports** including SOC analysts, engineers, and specialists
|
||||
- Part of executive leadership team with COO/CEO/CFO, participating in quarterly strategic planning
|
||||
- Oversaw Red Team/Offensive Security operations and Managed Remediation Service projects
|
||||
- Managed DFIR engagements, MDR services, proactive vulnerability scanning, patching, and penetration testing
|
||||
- Developed and maintained situational awareness reports for APT and foreign adversary incidents
|
||||
- Created threat trend analysis reports and operational metrics for executive visibility
|
||||
|
||||
---
|
||||
|
||||
### SOC Technical Manager
|
||||
**Compuquip Cybersecurity** | Tampa, FL | January 2021 - March 2023
|
||||
|
||||
Managed SOC operations with focus on process development, team mentorship, and incident research.
|
||||
|
||||
- Authored comprehensive SOPs and training documentation establishing operational standards
|
||||
- Led incident research activities and mentored SOC engineers on advanced investigation techniques
|
||||
- Developed SOC playbooks and workflows standardizing response procedures
|
||||
- Generated end-of-month operational reports for management and customer stakeholders
|
||||
- Maintained threat intelligence and situational awareness reports for advanced persistent threats
|
||||
- Created threat trend analysis reports and performance metrics
|
||||
|
||||
---
|
||||
|
||||
### Sr. Cyber Security Architect
|
||||
**Travel Syndication Technology (TST)** | Alpharetta, GA | April 2020 - January 2021
|
||||
|
||||
Responsible for security architecture, compliance programs, and security operations strategy.
|
||||
|
||||
- Developed and maintained cloud security posture and protection controls
|
||||
- Created custom automation tools for infrastructure attack simulation and detection design
|
||||
- Led organization through PCI and NIST 800-series compliance audits
|
||||
- Formulated and managed phishing awareness and developer security training programs
|
||||
- Designed automated security verification and testing programs
|
||||
|
||||
---
|
||||
|
||||
### Senior Cyber Security Engineer
|
||||
**Intercontinental Exchange** | Marietta, GA | March 2020 - April 2020
|
||||
|
||||
Architecture and Automation Team member focused on SOC tooling and data pipeline optimization.
|
||||
|
||||
- Designed security data flow architecture from endpoints through aggregation, parsing, and storage
|
||||
- Developed custom tools automating SOC triage and response activities
|
||||
- Built vulnerability and threat hunting dashboards for tracking and mitigation
|
||||
- Incorporated security into CI/CD pipelines including cloud-based deployments
|
||||
|
||||
---
|
||||
|
||||
### Cyber Security Engineer
|
||||
**Intercontinental Exchange** | Marietta, GA | August 2018 - March 2020
|
||||
|
||||
Incident Response and Digital Forensics Team lead investigator.
|
||||
|
||||
- Served as lead investigator on critical security incidents with thorough forensic investigations
|
||||
- Created extensive documentation establishing IR team processes and procedures
|
||||
- Led malware analysis operations in isolated sandbox environments
|
||||
- Developed training programs including custom malware writing exercises for junior analysts
|
||||
- Managed multi-server compromise investigations coordinating across three teams and time zones
|
||||
|
||||
---
|
||||
|
||||
### Technical Services Manager
|
||||
**The National Wild Turkey Federation** | Edgefield, SC | October 2015 - August 2018
|
||||
|
||||
Managed IT team of 8 direct reports supporting 300+ staff members.
|
||||
|
||||
- Directed team of technicians and developers with full performance management responsibilities
|
||||
- Managed security for entire web presence including network and application security
|
||||
- Negotiated vendor contracts saving $50,000+ annually through in-house migrations
|
||||
- Oversaw infrastructure expansion doubling server capacity
|
||||
|
||||
---
|
||||
|
||||
## CERTIFICATIONS
|
||||
|
||||
| Certification | Issuer |
|
||||
|:-------------|:-------|
|
||||
| **GWAPT** - Web Application Penetration Tester | GIAC |
|
||||
| **GCFA** - Forensic Analyst | GIAC |
|
||||
| **GCIH** - Incident Handler | GIAC |
|
||||
| **Lethal Forensicator Coin** | SANS (Award for Digital Forensics Excellence) |
|
||||
|
||||
---
|
||||
|
||||
## EDUCATION
|
||||
|
||||
**Associate Degree in Network Administration** | Virginia College | 2014-2016 | GPA: 4.0
|
||||
|
||||
---
|
||||
|
||||
## KEY ACHIEVEMENTS
|
||||
|
||||
- **SOC Scaling**: Grew MSSP SOC from 16 to 52 clients while maintaining service excellence
|
||||
- **Operational Excellence**: Improved SOC margins from 18% to 52% through process optimization
|
||||
- **Automation Leadership**: Built systems processing 3,500 weekly tickets with 47% automated resolution
|
||||
- **Team Development**: Successfully led and mentored teams up to 17 direct reports
|
||||
- **Executive Partnership**: Collaborated with C-suite on strategic direction as part of leadership team
|
||||
- **Enterprise Scale**: Managed operations for 50+ clients, 150,000+ assets, 1M+ users
|
||||
Reference in New Issue
Block a user