first commit

This commit is contained in:
2025-12-08 11:50:36 -06:00
commit c2cee5c708
19 changed files with 1492 additions and 0 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

15
sources/briarwood.md Normal file
View File

@@ -0,0 +1,15 @@
IT Coordinator, Network Administrator, System Administrator
Briarwood Academy
Aug 2006 - Apr 2014 · 7 yrs 9 mos
During my role as an IT coordinator:
I oversaw budgets and deployment strategies of the entire IT department of the school.
I also was responsible for administering servers, desktop computers, printers, routers, switches, firewalls, phones, smartphones, software deployment, security updates, and patches.
My list of accomplishments is as follows:
• Shifted all servers from physical to virtual to save space and minimize costs.
• Rolled out wireless for the entire campus comprising of several acres.
• Negotiated and delivered a fiber link for the school free of charge.
• Administer windows server infrastructure that include Windows 2008 and 2012 and Cisco XEN Server
• Managed Linux NAS storage solutions for 200+ workstations.
During my role as an IT coordinator: I oversaw budgets and deployment strategies of the entire IT department of the school. I also was responsible for administering servers, desktop computers, printers, routers, switches, firewalls, phones, smartphones, software deployment, security updates, and patches. My list of accomplishments is as follows: • Shifted all servers from physical to virtual to save space and minimize costs. • Rolled out wireless for the entire campus comprising of several acres. • Negotiated and delivered a fiber link for the school free of charge. • Administer windows server infrastructure that include Windows 2008 and 2012 and Cisco XEN Server • Managed Linux NAS storage solutions for 200+ workstations.
Skills: Computer Network Operations · Open-Source Software · Debian · Network Troubleshooting · Linux

10
sources/certifications.md Normal file
View File

@@ -0,0 +1,10 @@
Web App Penetration Testing and Ethical Hacking, SANS - SEC542, 2020
Web Application Penetration Tester, GWAPT
Advanced Incident Response, Threat Hunting, and Digital Forensics, SANS - SEC508, 2019
Forensic Analyst, GCFA
Lethal Forensicator Coin Winner (SANS Challenge Coin), GIAC, 2019
Hacker Techniques Training and Incident Handling, SANS - SEC504, 2018
Incident Handler, GCIH
Associates in Network Administrator, Virginia College, 2014 2016
Graduated with Highest Honors and GPA of 4.0
A+ Certification, COMP001000012110, COMPTIA 2001

62
sources/compuquip.md Normal file
View File

@@ -0,0 +1,62 @@
Compuquip Cybersecurity
Full-time · 4 yrsFull-time · 4 yrs
RemoteRemote
Director of Automation
Director of Automation
Jun 2024 - Dec 2024 · 7 mosJun 2024 to Dec 2024 · 7 mos
Doral, Florida, United StatesDoral, Florida, United States
Lead the Automation Team to deliver the automation needs of the business.
Spearheaded new automation processes and procedures including standup of new architecture and infrastructure to handle new processes.
Drove and mentored the team in new Automation workflows using Python, AWS Lambda and SOAR technology.
Developed custom AI processes to handle several key business needs using custom prompts and data.
Limited description due to security - Details available upon request.
Lead the Automation Team to deliver the automation needs of the business. Spearheaded new automation processes and procedures including standup of new architecture and infrastructure to handle new processes. Drove and mentored the team in new Automation workflows using Python, AWS Lambda and SOAR technology. Developed custom AI processes to handle several key business needs using custom prompts and data. Limited description due to security - Details available upon request.
Skills: Executive Management · Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · Hiring · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Executive-level Communication · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · Network Automation · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Low-Code Development · Startups · Debian · Network Troubleshooting · Recruiting · Machine Learning · Strategic Planning · Artificial Intelligence (AI) · Team Management · Ticketing Systems · Infrastructure Management · Enterprise Architecture · Large Language Models (LLM) · Engineering Leadership · Technical Specs · Team Leadership · No-Code Development Platforms · Automation · Retrieval-Augmented Generation (RAG) · Linux · Architectural Drawings
Skills: Executive Management · Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · Hiring · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Executive-level Communication · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · Network Automation · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Low-Code Development · Startups · Debian · Network Troubleshooting · Recruiting · Machine Learning · Strategic Planning · Artificial Intelligence (AI) · Team Management · Ticketing Systems · Infrastructure Management · Enterprise Architecture · Large Language Models (LLM) · Engineering Leadership · Technical Specs · Team Leadership · No-Code Development Platforms · Automation · Retrieval-Augmented Generation (RAG) · Linux · Architectural Drawings
SOC Director
Mar 2023 - Jun 2024 · 1 yr 4 mos
Doral, Florida, United States
Oversee Red team / Offensive Security Teams
Oversee Managed Remediation Service projects.
Manage SOC Operations and Develop SOC playbooks / workflows.
Maintain situational awareness reports for advanced threats such as APT and FO incidents
Support SOC analysis, engineers in handling and response activity.
Develop threat trend analysis reports and metrics.
Oversee Red team / Offensive Security Teams Oversee Managed Remediation Service projects. Manage SOC Operations and Develop SOC playbooks / workflows. Maintain situational awareness reports for advanced threats such as APT and FO incidents Support SOC analysis, engineers in handling and response activity. Develop threat trend analysis reports and metrics.
Skills: Executive Management · Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · Hiring · A/B Testing · Management · Digital Forensics · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Leadership · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Low-Code Development · Startups · Debian · Network Troubleshooting · Recruiting · Machine Learning · Strategic Planning · Artificial Intelligence (AI) · Team Management · Ticketing Systems · Infrastructure Management · Malware Analysis · Enterprise Architecture · Large Language Models (LLM) · Engineering Leadership · Technical Specs · Team Leadership · No-Code Development Platforms · Automation · Retrieval-Augmented Generation (RAG) · Linux · Architectural Drawings
Skills: Executive Management · Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · Hiring · A/B Testing · Management · Digital Forensics · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Leadership · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Low-Code Development · Startups · Debian · Network Troubleshooting · Recruiting · Machine Learning · Strategic Planning · Artificial Intelligence (AI) · Team Management · Ticketing Systems · Infrastructure Management · Malware Analysis · Enterprise Architecture · Large Language Models (LLM) · Engineering Leadership · Technical Specs · Team Leadership · No-Code Development Platforms · Automation · Retrieval-Augmented Generation (RAG) · Linux · Architectural Drawings
SOC Technical Manager
Jan 2021 - Mar 2023 · 2 yrs 3 mos
Tampa, Florida, United States
Author SOPs and training documentation.
Lead Incident Research and Mentor SOC Engineers.
Develop threat trend analysis reports and metrics.
Support SOC analysis, handling and response activity.
Generates end-of-month reports for managers and customers
Manage SOC Operations and Develop SOC playbooks / workflows.
Maintain situational awareness reports for advanced threats such as APT and FO incidents
Author SOPs and training documentation. Lead Incident Research and Mentor SOC Engineers. Develop threat trend analysis reports and metrics. Support SOC analysis, handling and response activity. Generates end-of-month reports for managers and customers Manage SOC Operations and Develop SOC playbooks / workflows. Maintain situational awareness reports for advanced threats such as APT and FO incidents
Skills: Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · Hiring · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Low-Code Development · Startups · Debian · Network Troubleshooting · Strategic Planning · Team Management · Ticketing Systems · Infrastructure Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · No-Code Development Platforms · Automation · Linux · Architectural Drawings
Skills: Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · Hiring · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Low-Code Development · Startups · Debian · Network Troubleshooting · Strategic Planning · Team Management · Ticketing Systems · Infrastructure Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · No-Code Development Platforms · Automation · Linux · Architectural Drawings
Additionally, At Compuquip I was directly responsible for the following.
Managed a growing soc that Grew from clients from 16 customers to 52 over 4 years with an expantion of services.
I was directly responsible for making changes in program vendors and service pricing which lead to the SOC going from an 18% margin to 52% profitability, with one quarter being 80% profitable. This helped our company grow 15% net income each year.
Directly managed a team of 17 reports.
Managed DFIR Engagements, MDR services, Proactive Vulnerability Scanning, Patching Engagements, and Pentesting Pro-services.
I was on the leadership team with the (COO / CEO / CFO) and involved in quarterly meetings to steer the direction of the company.
I wrote all the automation for ticket flow and processing that was directly responsible for handling the alert flow from independant systems to a centralized ticket platform. The automation was responsible for handling 3500 tickets a week. The automation also closed 47% of these tickets 100% without any human involvement with custom heuristics, log searches, filtering rulesets, AI, and custom logic / rule engines. I was also directly incharge in the design, programming, and deployment of the AI tools, prompts, code, and logic.

18
sources/contractor.md Normal file
View File

@@ -0,0 +1,18 @@
Senior Information Security Consultant
Confidential · Contract
Jan 2025 - Present · 1 yr
Remote
Develop, Design, and Review risk assessments and vulnerability scans of client networks and systems. Developing and implementing robust security controls and countermeasures to mitigate identified risks. Designing and deploying secure architectures for cloud, on-premises, and hybrid environments. Providing guidance on compliance with industry regulations (e.g. HIPAA, PCI-DSS, GDPR, NIST 800-53). Collaborating with clients to develop and implement incident response and disaster recovery plans. Conducting regular security audits and assessments to ensure ongoing compliance and security posture.
Details available upon request.
Develop, Design, and Review risk assessments and vulnerability scans of client networks and systems. Developing and implementing robust security controls and countermeasures to mitigate identified risks. Designing and deploying secure architectures for cloud, on-premises, and hybrid environments. Providing guidance on compliance with industry regulations (e.g. HIPAA, PCI-DSS, GDPR, NIST 800-53). Collaborating with clients to develop and implement incident response and disaster recovery plans. Conducting regular security audits and assessments to ensure ongoing compliance and security posture. Details available upon request.
Skills: Leadership · Programming · Cybersecurity
Extra Details:
I was a short term director for American Technology Services (ATS) Cyber Security Services as part of a contract role to help elevate their SOC services.
I helped restructure their SOC flow, train the team on proper triage processes and uplift the training of the manager. While doing this, I directly handled their largest fintech client to get their Vulnerability Managment Program back on track with Qualys over a 3 month period. I defined the scans, built custom reports, and built several scripts to align internal labels to Qualys tags and groupings to help Executive leadership get the data they needed. I was in this role from Jan - July
I am currently employed at a contract role with a mid-sized supplyer in the US Defense Space market. I am in charge of all SOC operations covering Alerts, DFIR engagements, Vulnerability Management. I also run the automation operations, including writing code, SDLC, and deployment. I am responsible for multiple Microsoft tenants across multiple countries. Due to the nature of the engagement, writen details are limited, however, some details can be discussed via the interview.
I started this role in June.

39
sources/ice.md Normal file
View File

@@ -0,0 +1,39 @@
Intercontinental Exchange
Full-time · 1 yr 9 mos
Marietta, Georgia, United States
Senior Cyber Security Engineer
Mar 2020 - Apr 2020 · 2 mosMar 2020 to Apr 2020 · 2 mos
In this role, I was part of the Architecture and Automation Team.
I was responsible for devising designs and maintaining security data flow from network endpoints through aggregation, parsing, and data storage.
Created methods, processes, and algorithms to extract knowledge from structured/unstructured data.
Designed and developed custom tools to automate SOC triage and response activities to combat phishing, latertal movement, system monitoring, and security workflow.
At this role I also designed and adjusted egress content filtering, advanced network, and endpoint malware prevention and detection controls as well as incorporated security into infrastructure CI/CD pipelines, including Cloud based Technologies.
My specific accomplishments during this role enlists:
• Formulated vulnerability and threat hunting dashboard to facilitate tracking and mitigation of security related issues.
• Facilitated automation of triage and action steps through creation of custom software.
In this role, I was part of the Architecture and Automation Team. I was responsible for devising designs and maintaining security data flow from network endpoints through aggregation, parsing, and data storage. Created methods, processes, and algorithms to extract knowledge from structured/unstructured data. Designed and developed custom tools to automate SOC triage and response activities to combat phishing, latertal movement, system monitoring, and security workflow. At this role I also designed and adjusted egress content filtering, advanced network, and endpoint malware prevention and detection controls as well as incorporated security into infrastructure CI/CD pipelines, including Cloud based Technologies. My specific accomplishments during this role enlists: • Formulated vulnerability and threat hunting dashboard to facilitate tracking and mitigation of security related issues. • Facilitated automation of triage and action steps through creation of custom software.
Skills: Computer Network Operations · Data Engineering · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · Hiring · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Collaborative Leadership · Debian · Network Troubleshooting · Team Management · Ticketing Systems · Infrastructure Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings
Skills: Computer Network Operations · Data Engineering · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · Hiring · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Collaborative Leadership · Debian · Network Troubleshooting · Team Management · Ticketing Systems · Infrastructure Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings
Cyber Security Engineer
Aug 2018 - Mar 2020 · 1 yr 8 mos
In this role, I was part of the Incident Response / Digital Forensics Team.
I often served as a lead investigator on many critical incidents and conducted thorough investigations as well as efficiently supervised members within my team.
Created extensive documentation on processes and procedures for the entire IR team.
Served as a leader in Malware Analysis in isolated sandboxed environments.
Generated incident reports and findings for not only team members, but also members of upper managment.
My specific accomplishments during this role enlists:
• Developed skills of junior agents, including custom malware writing through training.
• Managed multi-server compromise investigations from start to finish coordinating across three teams and time zones.
In this role, I was part of the Incident Response / Digital Forensics Team. I often served as a lead investigator on many critical incidents and conducted thorough investigations as well as efficiently supervised members within my team. Created extensive documentation on processes and procedures for the entire IR team. Served as a leader in Malware Analysis in isolated sandboxed environments. Generated incident reports and findings for not only team members, but also members of upper managment. My specific accomplishments during this role enlists: • Developed skills of junior agents, including custom malware writing through training. • Managed multi-server compromise investigations from start to finish coordinating across three teams and time zones.
Skills: Computer Network Operations · Data Engineering · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · A/B Testing · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Debian · Network Troubleshooting · Ticketing Systems · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings
Skills: Computer Network Operations · Data Engineering · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · A/B Testing · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Debian · Network Troubleshooting · Ticketing Systems · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings

13
sources/morgan.md Normal file
View File

@@ -0,0 +1,13 @@
System Administrator
Morgan Thermal Ceramics
Oct 2014 - Dec 2014 · 3 mos
Augusta, GA
During my role as a systems administrator:
I was responsible for managing network support and upgrades, including configuration, installation of fiber optic links.
My accomplishments are:
• Served a key role during implementation of a plan to install 35 managed switches with several VLANS.
• Diligently resolved major data outage in one of the main switch rooms without assistance for several hours.
• Accomplished three month assignment and tasks within one month. Developed automated cloning system to minimize cost and speed up the process of cloning.
During my role as a systems administrator: I was responsible for managing network support and upgrades, including configuration, installation of fiber optic links. My accomplishments are: • Served a key role during implementation of a plan to install 35 managed switches with several VLANS. • Diligently resolved major data outage in one of the main switch rooms without assistance for several hours. • Accomplished three month assignment and tasks within one month. Developed automated cloning system to minimize cost and speed up the process of cloning.
Skills: Computer Network Operations · Open-Source Software · Debian · Network Troubleshooting · Linux

33
sources/nwtf.md Normal file
View File

@@ -0,0 +1,33 @@
The National Wild Turkey Federation
Full-time · 3 yrs 8 mos
Edgefield, South Carolina
Technical Services Manager
Oct 2015 - Aug 2018 · 2 yrs 11 mos
During my role as a Technical Services Manager:
I managed a team of technicians and developers who in turn facilitated more than 300 staff members. I also oversaw performances of eight members who were my direct reports.
I leveraged efforts to conduct vendor/supplier negotiations to minimize costs.
I also managed security of entire web presence, including network side and programming code.
My list of accomplishments at this role are as follows:
• Efficiently managed doubling of server space and usage across five years.
• Streamlined all server management from all servers in the datacenter.
• Test network performance and provide network performance statistics and reports
• Developed strategies for maintaining network infrastructure including monitoring networks to ensure security and availability to specific users.
During my role as a Technical Services Manager: I managed a team of technicians and developers who in turn facilitated more than 300 staff members. I also oversaw performances of eight members who were my direct reports. I leveraged efforts to conduct vendor/supplier negotiations to minimize costs. I also managed security of entire web presence, including network side and programming code. My list of accomplishments at this role are as follows: • Efficiently managed doubling of server space and usage across five years. • Streamlined all server management from all servers in the datacenter. • Test network performance and provide network performance statistics and reports • Developed strategies for maintaining network infrastructure including monitoring networks to ensure security and availability to specific users.
Skills: Computer Network Operations · Software Architecture · Software Engineering Practices · Hiring · Management · Continuous Integration and Continuous Delivery (CI/CD) · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Network Automation · Risk Monitoring · Problem Solving · Software Development · Debian · Network Troubleshooting · Recruiting · Team Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings
Skills: Computer Network Operations · Software Architecture · Software Engineering Practices · Hiring · Management · Continuous Integration and Continuous Delivery (CI/CD) · Team Development · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Network Automation · Risk Monitoring · Problem Solving · Software Development · Debian · Network Troubleshooting · Recruiting · Team Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings
Network / Server Administrator
Jan 2015 - Oct 2015 · 10 mos
In this role, I was responsible for managing servers such as Windows Server and Linux Environments while serving as a Network/Server Administrator.
I designed, managed, and monitored all infrastructure systems with a focus on LANs, WANs, and Security.
My job role also encompassed development and maintenance of process automation through scripting and programming.
• Administer servers, desktop computers, printers, routers, switches, firewalls, phones, smartphones, software deployment, security updates and patches.
• Created appropriate procedures, documentation, inventory assessment, and other procedures related to IT
• Spearheaded ongoing performance tuning, hardware upgrades, and resource optimization as required.
• Performed proactive analysis of infrastructure capacity and performance
In this role, I was responsible for managing servers such as Windows Server and Linux Environments while serving as a Network/Server Administrator. I designed, managed, and monitored all infrastructure systems with a focus on LANs, WANs, and Security. My job role also encompassed development and maintenance of process automation through scripting and programming. • Administer servers, desktop computers, printers, routers, switches, firewalls, phones, smartphones, software deployment, security updates and patches. • Created appropriate procedures, documentation, inventory assessment, and other procedures related to IT • Spearheaded ongoing performance tuning, hardware upgrades, and resource optimization as required. • Performed proactive analysis of infrastructure capacity and performance
Skills: Computer Network Operations · Software Engineering Practices · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Network Automation · Risk Monitoring · Problem Solving · Software Development · Debian · Network Troubleshooting · Engineering Leadership · Technical Specs · Automation · Linux
Skills: Computer Network Operations · Software Engineering Practices · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Network Automation · Risk Monitoring · Problem Solving · Software Development · Debian · Network Troubleshooting · Engineering Leadership · Technical Specs · Automation · Linux

View File

@@ -0,0 +1,12 @@
Computer Service Technician
Pronet
May 2005 - Aug 2006 · 1 yr 4 mosMay 2005 to Aug 2006 · 1 yr 4 mos
Information Technology expert for hire in block time situations and emergency disaster recovery.
Skills: Open-Source Software
Sitel Group
Teir 3 Support
Sitel
May 1999 - May 2001 · 2 yrs 1 moMay 1999 to May 2001 · 2 yrs 1 mo
Help Teir 2 technicians with customer service issues as well as test new developing techologies

147
sources/skills.md Normal file
View File

@@ -0,0 +1,147 @@
# Technical Skills
## Security Operations & Incident Response
**SIEM Platforms**
- Splunk
- ELK Stack (Elasticsearch, Logstash, Kibana)
- Sentinel One
- Rapid 7 IDR
- Stellar Cyber Security
- Microsoft Sentinel
- Microsoft Defender (Cloud / 365)
**SOAR Platforms**
- Swimlane
- D3 SOAR
- Torq
**EDR & Threat Detection**
- Darktrace
- Tanium
- Vectra
- FireEye
- Sentinel One
**DFIR & Forensics**
- Volatility (memory forensics)
- Malware analysis & reverse engineering
- Multi-host compromise investigation
- Incident response planning & execution
- Evidence collection & preservation
**Threat Hunting & Detection**
- Threat hunting methodologies
- Detection engineering
- Custom heuristics & rule development
- Behavioral analysis
## Penetration Testing & Red Team
- Metasploit Framework
- Web application security testing
- Automated attack simulation
- Red team engagement oversight
- Purple team testing
- Phishing campaign management & security training
- Vulnerability assessment & remediation
## Cloud Platforms & Security
**Cloud Providers**
- AWS (Lambda, Bedrock, EC2, S3)
- Microsoft Azure
- Oracle Cloud Infrastructure (OCI)
**Cloud Security**
- Cloud security architecture
- Hybrid cloud environments
- Cloud security posture management
- Identity & access management
## AI/ML & Security Automation
**AI & Machine Learning**
- AWS Bedrock / Large Language Models
- Retrieval-Augmented Generation (RAG)
- Machine learning for security detection
- Custom AI process development
**Automation**
- SOAR playbook development
- Alert triage automation (11,000-21,000 alerts/month)
- Python-based automation programs
- Workflow automation & orchestration
- Custom tool development
## Programming & Scripting
- Python (primary)
- PowerShell
- Bash
- SQL
- YAML configuration management
## Infrastructure & Systems
**Server Administration**
- Windows Server (2008, 2012, 2016+)
- Linux/UNIX administration
- Active Directory management
**Virtualization & Containers**
- VMware
- Hyper-V
- Docker
- Kubernetes
**Networking**
- Network architecture & design
- Network segmentation & VLANs
- Firewall management & configuration
- WAN/LAN design & management
## Compliance & Frameworks
- NIST 800-53 / 800 series
- PCI-DSS
- HIPAA
- GDPR
- CIS Benchmarks
- Security audit navigation & remediation
## Leadership & Management
**Team Leadership**
- SOC team management (up to 17 direct reports)
- Technical team oversight (8+ direct reports)
- Cross-functional team coordination
- Multi-timezone project management
**Operations Management**
- MSSP operations (50+ clients, 150,000+ assets, 1 million+ users)
- Budget & P&L management
- Vendor negotiations & management
- Service delivery optimization
**Development & Training**
- Training program development
- Security awareness programs
- Mentorship & skill development
- Hiring & team building
- SOP & documentation creation
## Operating Systems
- Linux (Debian, RHEL, Ubuntu, CentOS)
- Windows Server
- Windows Desktop
- macOS
- UNIX
## Project & Ticket Management
- Jira
- ServiceNow
- Custom ticketing systems
- Agile/Scrum methodologies

21
sources/tst.md Normal file
View File

@@ -0,0 +1,21 @@
Travel Syndication Technology (TST)
Sr. Cyber Security Architect
Travel Syndication Technology (TST) · Full-time
Apr 2020 - Jan 2021 · 10 mos
Alpharetta, Georgia, United States
I am responsible for formulating and overseeing phishing and developer security training programs in the organization.
I also develop as well as maintain cloud security protections and security posture across various cloud resources.
Part of my responsibilities also encompasses creation of custom tools to automate attacks against infrastructure, as well as design detections for attacks.
I also setup and configure automated Docker images focused on various security solutions at this role.
My list of accomplishments at this role are as follows:
• Saved $10,000+ through effective negotiations with vendor/supplier.
• Steered organization through several audits, including PCI and NIST 800 series.
• Devised, created, and upgraded cyber security related policies and procedures to upgrade data security.
• Designed and implemented automated security verification and attack programs / Automated Red Team Attacks.
I am responsible for formulating and overseeing phishing and developer security training programs in the organization. I also develop as well as maintain cloud security protections and security posture across various cloud resources. Part of my responsibilities also encompasses creation of custom tools to automate attacks against infrastructure, as well as design detections for attacks. I also setup and configure automated Docker images focused on various security solutions at this role. My list of accomplishments at this role are as follows: • Saved $10,000+ through effective negotiations with vendor/supplier. • Steered organization through several audits, including PCI and NIST 800 series. • Devised, created, and upgraded cyber security related policies and procedures to upgrade data security. • Designed and implemented automated security verification and attack programs / Automated Red Team Attacks.
Skills: Executive Management · Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Executive-level Communication · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Debian · Network Troubleshooting · Strategic Planning · Infrastructure Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings
Skills: Executive Management · Computer Network Operations · Data Engineering · Risk Management · Software Architecture · Software Engineering Practices · User Behavior · Cyber-security · Information Security Analysis · Data Privacy · A/B Testing · Management · Continuous Integration and Continuous Delivery (CI/CD) · Security Operations Center · Team Development · Executive-level Communication · Application Security · Technological Innovation · Strategic Thinking · Open-Source Software · Technical Leadership · Security Information and Event Management (SIEM) · EDR · Network Automation · Risk Monitoring · Ansible · Problem Solving · Security Operations · Software Development · Startup Development · Collaborative Leadership · Debian · Network Troubleshooting · Strategic Planning · Infrastructure Management · Enterprise Architecture · Engineering Leadership · Technical Specs · Team Leadership · Automation · Linux · Architectural Drawings