Files
resume/resume.html
2025-12-08 11:50:36 -06:00

615 lines
35 KiB
HTML
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
<!doctype html>
<html lang="en" style="">
<head>
<meta charset="utf-8" />
<title>Phillip Tarrant</title>
<meta name="description" content="Accomplished and analytical professional with 20+ years of experience in cybersecurity, server infrastructures, and data-center operations. Proven expertise in AI use in Cyber Operations, digital forensics, penetration testing, information system management, malware reversing, threat detection, and threat hunting. Proactive leader with a proven record of managing multiple large teams and leading the charge to complete project goals. Managed MSSP operations for 50+ large business clients encompassing over 150,000 assets and 1 million+ users." />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Lato:400,700&display=swap" />
<style>
:root{color-scheme:light dark;--color-background-light: #ffffff;--color-dimmed-light: #f3f4f5;--color-primary-light: #191e23;--color-secondary-light: #6c7781;--color-accent-light: #0073aa;--color-background-dark: #191e23;--color-dimmed-dark: #23282d;--color-primary-dark: #fbfbfc;--color-secondary-dark: #ccd0d4;--color-accent-dark: #00a0d2;--color-background: var(--color-background-light);--color-dimmed: var(--color-dimmed-light);--color-primary: var(--color-primary-light);--color-secondary: var(--color-secondary-light);--color-accent: var(--color-accent-light);--scale-ratio: 1.25;--scale0: 1rem;--scale1: calc(var(--scale0) * var(--scale-ratio));--scale2: calc(var(--scale1) * var(--scale-ratio));--scale3: calc(var(--scale2) * var(--scale-ratio));--scale4: calc(var(--scale3) * var(--scale-ratio));--scale5: calc(var(--scale4) * var(--scale-ratio))}@media (prefers-color-scheme: dark){:root{--color-background: var(--color-background-dark);--color-dimmed: var(--color-dimmed-dark);--color-primary: var(--color-primary-dark);--color-secondary: var(--color-secondary-dark);--color-accent: var(--color-accent-dark)}}*{box-sizing:border-box;margin:0;padding:0}html{font-size:14px}body{background:var(--color-background);color:var(--color-primary);display:grid;font:1em/1.5 Lato,sans-serif;gap:2em;grid-template-columns:[full-start] 1fr [main-start side-start] minmax(min-content,12em) [side-end content-start] minmax(min-content,36em) [main-end content-end] 1fr [full-end];grid-template-rows:auto [content] 0;margin-bottom:4em}body:before{content:"";grid-column:full;grid-row:content}ol,ul{padding-left:1em}:not(.icon-list,.tag-list)>li+li{margin-top:.4em}li::marker,.network{color:var(--color-secondary)}a{color:var(--color-accent);text-decoration:none}a:focus,a:hover{text-decoration:underline}h1,h2,h3,h5{font-weight:400}h1,h2,h3{line-height:1.2}h1{font-size:var(--scale5)}h2{color:var(--color-secondary);font-size:var(--scale4)}h3{color:var(--color-secondary);font-size:var(--scale3);grid-column:side;margin-bottom:1rem}h4{font-size:var(--scale2)}h5{font-size:var(--scale1)}h6{font-size:var(--scale0)}blockquote{border-left:.2em solid var(--color-dimmed);padding-left:1em}cite{color:var(--color-secondary);font-style:inherit}cite:before{content:"— "}svg{margin-right:.2em;vertical-align:text-bottom}.masthead{background:var(--color-dimmed);display:inherit;gap:inherit;grid-column:full;grid-template-columns:inherit;padding:4em 0;text-align:center}.masthead>*,section{grid-column:main}.masthead>img{border:4px solid;border-radius:50%;margin:0 auto;max-width:12em}article>*+*,blockquote>*+*,.timeline>div>*+*{margin-top:.6em}.meta{color:var(--color-secondary)}.stack{display:grid;gap:1.5em}.icon-list{display:flex;flex-wrap:wrap;gap:.4em 1em;justify-content:center;list-style:none;padding:0}.grid-list{display:grid;gap:1em}.tag-list{display:flex;flex-wrap:wrap;gap:.4em;list-style:none;padding:0}.tag-list>li{background:var(--color-dimmed);border-radius:.2em;padding:.2em .6em}.timeline>div{position:relative}.timeline>div:not(:last-child){padding-bottom:1rem}.timeline>div:not(:last-child):before{content:"";position:absolute;top:1rem;left:-15px;width:2px;height:100%;background:var(--color-secondary)}.timeline>div:not(:only-child):after{content:"";position:absolute;top:.6rem;left:-20px;width:8px;height:8px;background:var(--color-secondary);border:2px solid var(--color-background);border-radius:50%}@media print,(min-width: 48em){h3{text-align:right;margin-bottom:inherit}.masthead{text-align:inherit}.masthead>*,section{grid-column:content}.masthead img{grid-column:side;grid-row:span 2;max-width:100%}section{display:contents}.icon-list{flex-direction:column}.grid-list{grid-template-columns:repeat(auto-fit,minmax(calc((100% - 1em)/2),1fr))}}time+time-duration:before{content:"· "}@media print{time-duration{display:none}}
</style>
<script type="module">
const pluralize = (num, str) => `${num} ${num === 1 ? str : str.concat('s')}`
class TimeDuration extends HTMLElement {
connectedCallback() {
const dates = this.getAttribute('dates')
if (!dates) return this.remove()
const duration = dates.split('|').reduce((acc, _date, i, dates) => {
if (i % 2) return acc
const [startDate, endDate] = dates.slice(i)
return acc + (startDate ? +new Date(endDate || Date.now()) - +new Date(startDate) : 0)
}, 0)
const diffDate = new Date(duration)
const years = diffDate.getFullYear() - 1970
const months = diffDate.getMonth()
const days = diffDate.getDate() - 1
const segments = [
years && pluralize(years, 'yr'),
months && pluralize(months, 'mo'),
days && !years && !months && pluralize(days, 'day'),
].filter(Boolean)
if (!segments.length) return
this.textContent = segments.join(' ')
}
}
customElements.define('time-duration', TimeDuration)
</script>
</head>
<body>
<header class="masthead">
<div><h1>Phillip Tarrant</h1> <h2>Cybersecurity Director | Automation Leader</h2></div>
<article><p>Accomplished and analytical professional with 20+ years of experience in cybersecurity, server infrastructures, and data-center operations. Proven expertise in AI use in Cyber Operations, digital forensics, penetration testing, information system management, malware reversing, threat detection, and threat hunting. Proactive leader with a proven record of managing multiple large teams and leading the charge to complete project goals. Managed MSSP operations for 50+ large business clients encompassing over 150,000 assets and 1 million+ users.</p></article>
<ul class="icon-list">
<li>
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-map-pin"><path d="M21 10c0 7-9 13-9 13s-9-6-9-13a9 9 0 0 1 18 0z"></path><circle cx="12" cy="10" r="3"></circle></svg> Morrison, United States
</li>
<li>
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-mail"><path d="M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z"></path><polyline points="22,6 12,13 2,6"></polyline></svg>
<a href="mailto:ptarrant@gmail.com">ptarrant@gmail.com</a>
</li>
<li>
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-phone"><path d="M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"></path></svg>
<a href="tel:(706)294-6733">(706) 294-6733</a>
</li>
<li><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-link"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg> <a href="https://www.linkedin.com/in/phillip-tarrant-cyber">www.linkedin.com/in/phillip-tarrant-cyber</a></li>
<li>
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-linkedin"><path d="M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"></path><rect x="2" y="9" width="4" height="12"></rect><circle cx="4" cy="4" r="2"></circle></svg> <a href="https://www.linkedin.com/in/phillip-tarrant-cyber">phillip-tarrant-cyber</a>
<span class="network">(LinkedIn)</span>
</li>
</ul>
</header>
<section id="work">
<h3>Work</h3>
<div class="stack">
<article>
<header>
<h4>Senior Information Security Consultant</h4>
<div class="meta">
<div>
<strong>Confidential</strong>
</div>
<div><time datetime="2025-01">Jan 2025</time> Present <time-duration dates="2025-01|"></time-duration></div>
<div>Remote</div>
</div>
</header>
<div class="timeline">
<div>
<p>Contract consulting role providing cybersecurity leadership and technical expertise.</p>
<ul>
<li><p>Develop, design, and review risk assessments and vulnerability scans of client networks and systems</p></li><li><p>Developing and implementing robust security controls and countermeasures to mitigate identified risks</p></li><li><p>Designing and deploying secure architectures for cloud, on-premises, and hybrid environments</p></li><li><p>Providing guidance on compliance with industry regulations (HIPAA, PCI-DSS, GDPR, NIST 800-53)</p></li><li><p>Collaborating with clients to develop and implement incident response and disaster recovery plans</p></li><li><p>Conducting regular security audits and assessments to ensure ongoing compliance and security posture</p></li><li><p>Short-term director role at American Technology Services (ATS) restructuring SOC flow and training</p></li><li><p>Managed Vulnerability Management Program for largest fintech client using Qualys</p></li><li><p>Currently managing SOC operations for US Defense Space market supplier across multiple Microsoft tenants</p></li>
</ul>
</div>
</div>
</article>
<article>
<header>
<h4>Compuquip Cybersecurity</h4>
<div class="meta">
<div><time-duration dates="2024-06|2024-12|2023-03|2024-06|2021-01|2023-03"></time-duration></div>
</div>
</header>
<div class="timeline">
<div>
<div>
<h5>Director of Automation</h5>
<div class="meta">
<div><time datetime="2024-06">Jun 2024</time> <time datetime="2024-12">Dec 2024</time> <time-duration dates="2024-06|2024-12"></time-duration></div>
<div>Doral, Florida</div>
</div>
</div>
<p>Lead the Automation Team to deliver the automation needs of the business.</p>
<ul>
<li><p>Spearheaded new automation processes and procedures including standup of new architecture and infrastructure</p></li><li><p>Drove and mentored the team in new Automation workflows using Python, AWS Lambda and SOAR technology</p></li><li><p>Developed custom AI processes to handle several key business needs using custom prompts and data</p></li><li><p>Built automation handling 3,500 tickets weekly with 47% closed without human involvement</p></li><li><p>Designed, programmed, and deployed AI tools, prompts, code, and logic for security automation</p></li>
</ul>
</div>
<div>
<div>
<h5>SOC Director</h5>
<div class="meta">
<div><time datetime="2023-03">Mar 2023</time> <time datetime="2024-06">Jun 2024</time> <time-duration dates="2023-03|2024-06"></time-duration></div>
<div>Doral, Florida</div>
</div>
</div>
<p>Directed Security Operations Center and Red Team operations for MSSP clients.</p>
<ul>
<li><p>Grew SOC client base from 16 to 52 customers over tenure with expansion of services</p></li><li><p>Improved SOC profitability from 18% to 52% margin (80% in one quarter) contributing to 15% annual net income growth</p></li><li><p>Directly managed team of 17 reports</p></li><li><p>Oversaw Red team / Offensive Security Teams and Managed Remediation Service projects</p></li><li><p>Managed DFIR engagements, MDR services, Proactive Vulnerability Scanning, Patching, and Pentesting</p></li><li><p>Maintained situational awareness reports for advanced threats (APT and FO incidents)</p></li><li><p>Part of leadership team with COO/CEO/CFO involved in quarterly strategic planning</p></li>
</ul>
</div>
<div>
<div>
<h5>SOC Technical Manager</h5>
<div class="meta">
<div><time datetime="2021-01">Jan 2021</time> <time datetime="2023-03">Mar 2023</time> <time-duration dates="2021-01|2023-03"></time-duration></div>
<div>Tampa, Florida</div>
</div>
</div>
<p>Managed SOC Operations and led incident research and engineering teams.</p>
<ul>
<li><p>Authored SOPs and training documentation for SOC team</p></li><li><p>Lead Incident Research and mentored SOC Engineers</p></li><li><p>Developed threat trend analysis reports and metrics</p></li><li><p>Managed SOC Operations and developed SOC playbooks/workflows</p></li><li><p>Generated end-of-month reports for managers and customers</p></li><li><p>Maintained situational awareness reports for advanced threats</p></li>
</ul>
</div>
</div>
</article>
<article>
<header>
<h4>Sr. Cyber Security Architect</h4>
<div class="meta">
<div>
<strong>Travel Syndication Technology (TST)</strong>
</div>
<div><time datetime="2020-04">Apr 2020</time> <time datetime="2021-01">Jan 2021</time> <time-duration dates="2020-04|2021-01"></time-duration></div>
<div>Alpharetta, Georgia</div>
</div>
</header>
<div class="timeline">
<div>
<p>Responsible for security architecture, training programs, and compliance across the organization.</p>
<ul>
<li><p>Formulated and oversaw phishing and developer security training programs</p></li><li><p>Developed and maintained cloud security protections and security posture</p></li><li><p>Created custom tools to automate attacks against infrastructure and design detections</p></li><li><p>Saved $10,000+ through effective vendor/supplier negotiations</p></li><li><p>Steered organization through PCI and NIST 800 series audits</p></li><li><p>Devised, created, and upgraded cybersecurity related policies and procedures</p></li><li><p>Designed and implemented automated security verification and attack programs</p></li>
</ul>
</div>
</div>
</article>
<article>
<header>
<h4>Intercontinental Exchange</h4>
<div class="meta">
<div><time-duration dates="2020-03|2020-04|2018-08|2020-03"></time-duration></div>
</div>
</header>
<div class="timeline">
<div>
<div>
<h5>Senior Cyber Security Engineer</h5>
<div class="meta">
<div><time datetime="2020-03">Mar 2020</time> <time datetime="2020-04">Apr 2020</time> <time-duration dates="2020-03|2020-04"></time-duration></div>
<div>Marietta, Georgia</div>
</div>
</div>
<p>Part of the Architecture and Automation Team focused on security data flow and automation.</p>
<ul>
<li><p>Designed and maintained security data flow from network endpoints through aggregation, parsing, and storage</p></li><li><p>Created methods, processes, and algorithms to extract knowledge from structured/unstructured data</p></li><li><p>Designed custom tools to automate SOC triage and response activities</p></li><li><p>Incorporated security into infrastructure CI/CD pipelines including cloud technologies</p></li><li><p>Formulated vulnerability and threat hunting dashboard for tracking and mitigation</p></li>
</ul>
</div>
<div>
<div>
<h5>Cyber Security Engineer</h5>
<div class="meta">
<div><time datetime="2018-08">Aug 2018</time> <time datetime="2020-03">Mar 2020</time> <time-duration dates="2018-08|2020-03"></time-duration></div>
<div>Marietta, Georgia</div>
</div>
</div>
<p>Part of the Incident Response / Digital Forensics Team as lead investigator.</p>
<ul>
<li><p>Served as lead investigator on critical incidents with thorough investigations</p></li><li><p>Created extensive documentation on processes and procedures for the entire IR team</p></li><li><p>Served as leader in Malware Analysis in isolated sandboxed environments</p></li><li><p>Developed skills of junior agents including custom malware writing through training</p></li><li><p>Managed multi-server compromise investigations coordinating across three teams and time zones</p></li>
</ul>
</div>
</div>
</article>
<article>
<header>
<h4>The National Wild Turkey Federation</h4>
<div class="meta">
<div><time-duration dates="2015-10|2018-08|2015-01|2015-10"></time-duration></div>
</div>
</header>
<div class="timeline">
<div>
<div>
<h5>Technical Services Manager</h5>
<div class="meta">
<div><time datetime="2015-10">Oct 2015</time> <time datetime="2018-08">Aug 2018</time> <time-duration dates="2015-10|2018-08"></time-duration></div>
<div>Edgefield, South Carolina</div>
</div>
</div>
<p>Managed IT team supporting 300+ staff members with focus on infrastructure and security.</p>
<ul>
<li><p>Managed team of technicians and developers facilitating 300+ staff members</p></li><li><p>Oversaw 8 direct reports with performance management responsibilities</p></li><li><p>Conducted vendor/supplier negotiations to minimize costs</p></li><li><p>Managed security of entire web presence including network and programming code</p></li><li><p>Efficiently managed doubling of server space and usage</p></li><li><p>Migrated 3rd party tools to in-house solutions saving $50,000+ yearly</p></li>
</ul>
</div>
<div>
<div>
<h5>Network / Server Administrator</h5>
<div class="meta">
<div><time datetime="2015-01">Jan 2015</time> <time datetime="2015-10">Oct 2015</time> <time-duration dates="2015-01|2015-10"></time-duration></div>
<div>Edgefield, South Carolina</div>
</div>
</div>
<p>Managed Windows and Linux server environments with focus on infrastructure and automation.</p>
<ul>
<li><p>Designed, managed, and monitored infrastructure systems (LANs, WANs, Security)</p></li><li><p>Developed and maintained process automation through scripting and programming</p></li><li><p>Administered servers, computers, printers, routers, switches, firewalls, and phones</p></li><li><p>Spearheaded performance tuning, hardware upgrades, and resource optimization</p></li>
</ul>
</div>
</div>
</article>
<article>
<header>
<h4>System Administrator</h4>
<div class="meta">
<div>
<strong>Morgan Thermal Ceramics</strong>
</div>
<div><time datetime="2014-10">Oct 2014</time> <time datetime="2014-12">Dec 2014</time> <time-duration dates="2014-10|2014-12"></time-duration></div>
<div>Augusta, Georgia</div>
</div>
</header>
<div class="timeline">
<div>
<p>Contract role managing network support and infrastructure upgrades.</p>
<ul>
<li><p>Managed network support and upgrades including fiber optic link installation</p></li><li><p>Served key role implementing 35 managed switches with several VLANs</p></li><li><p>Resolved major data outage in main switch room without assistance</p></li><li><p>Completed three-month contract in one month</p></li><li><p>Developed automated cloning system to minimize cost and speed deployment</p></li>
</ul>
</div>
</div>
</article>
<article>
<header>
<h4>IT Coordinator / Network Administrator / System Administrator</h4>
<div class="meta">
<div>
<strong>Briarwood Academy</strong>
</div>
<div><time datetime="2006-08">Aug 2006</time> <time datetime="2014-04">Apr 2014</time> <time-duration dates="2006-08|2014-04"></time-duration></div>
<div>Warrenton, Georgia</div>
</div>
</header>
<div class="timeline">
<div>
<p>Oversaw IT department budgets and deployment strategies for the school.</p>
<ul>
<li><p>Oversaw budgets and deployment strategies for entire IT department</p></li><li><p>Administered servers, desktop computers, printers, routers, switches, firewalls</p></li><li><p>Shifted all servers from physical to virtual to save space and minimize costs</p></li><li><p>Rolled out wireless for entire campus comprising several acres</p></li><li><p>Negotiated and delivered fiber link for the school free of charge</p></li><li><p>Managed Linux NAS storage solutions for 200+ workstations</p></li>
</ul>
</div>
</div>
</article>
<article>
<header>
<h4>Computer Service Technician</h4>
<div class="meta">
<div>
<strong>Pronet</strong>
</div>
<div><time datetime="2005-05">May 2005</time> <time datetime="2006-08">Aug 2006</time> <time-duration dates="2005-05|2006-08"></time-duration></div>
<div>Georgia</div>
</div>
</header>
<div class="timeline">
<div>
<p>IT expert for hire in block time situations and emergency disaster recovery.</p>
</div>
</div>
</article>
<article>
<header>
<h4>Tier 3 Support</h4>
<div class="meta">
<div>
<strong>Sitel Group</strong>
</div>
<div><time datetime="1999-05">May 1999</time> <time datetime="2001-05">May 2001</time> <time-duration dates="1999-05|2001-05"></time-duration></div>
</div>
</header>
<div class="timeline">
<div>
<p>Assisted Tier 2 technicians with customer service issues and tested new developing technologies.</p>
</div>
</div>
</article>
</div>
</section>
<section id="education">
<h3>Education</h3>
<div class="stack">
<article>
<header>
<h4>Virginia College</h4>
<div class="meta">
<div>Associate in <strong>Network Administration</strong></div>
<div><time datetime="2014">Jan 2014</time> <time datetime="2016">Jan 2016</time> <time-duration dates="2014|2016"></time-duration></div>
</div>
</header>
</article>
</div>
</section>
<section id="awards">
<h3>Awards</h3>
<div class="stack">
<article>
<header>
<h4>Lethal Forensicator Coin Winner</h4>
<div class="meta">
<div>Awarded by <strong>SANS/GIAC</strong></div> <time datetime="2019-01-01">Jan 2019</time>
</div>
</header>
<p>SANS Challenge Coin for excellence in digital forensics</p>
</article>
</div>
</section>
<section id="certificates">
<h3>Certificates</h3>
<div class="stack">
<article>
<header>
<h4>GWAPT - Web Application Penetration Tester</h4>
<div class="meta">
<div>Issued by <strong>GIAC</strong></div> <time datetime="2020-01-01">Jan 2020</time>
</div>
</header>
</article>
<article>
<header>
<h4>GCFA - Forensic Analyst</h4>
<div class="meta">
<div>Issued by <strong>GIAC</strong></div> <time datetime="2019-01-01">Jan 2019</time>
</div>
</header>
</article>
<article>
<header>
<h4>GCIH - Incident Handler</h4>
<div class="meta">
<div>Issued by <strong>GIAC</strong></div> <time datetime="2018-01-01">Jan 2018</time>
</div>
</header>
</article>
<article>
<header>
<h4>A+ Certification</h4>
<div class="meta">
<div>Issued by <strong>CompTIA</strong></div> <time datetime="2001-01-01">Jan 2001</time>
</div>
</header>
</article>
</div>
</section>
<section id="skills">
<h3>Skills</h3>
<div class="grid-list">
<div>
<h4>Security Operations & SIEM</h4>
<ul class="tag-list">
<li>Splunk</li><li>ELK Stack</li><li>Microsoft Sentinel</li><li>Microsoft Defender</li><li>Sentinel One</li><li>Rapid7 IDR</li><li>Stellar Cyber</li>
</ul>
</div>
<div>
<h4>SOAR Platforms</h4>
<ul class="tag-list">
<li>Swimlane</li><li>D3 SOAR</li><li>Torq</li><li>Playbook Development</li><li>Workflow Automation</li>
</ul>
</div>
<div>
<h4>EDR & Threat Detection</h4>
<ul class="tag-list">
<li>Darktrace</li><li>Tanium</li><li>Vectra</li><li>FireEye</li><li>Sentinel One</li><li>Detection Engineering</li>
</ul>
</div>
<div>
<h4>DFIR & Forensics</h4>
<ul class="tag-list">
<li>Volatility</li><li>Malware Analysis</li><li>Reverse Engineering</li><li>Incident Response</li><li>Evidence Collection</li><li>Multi-host Investigation</li>
</ul>
</div>
<div>
<h4>Penetration Testing & Red Team</h4>
<ul class="tag-list">
<li>Metasploit</li><li>Web Application Security</li><li>Attack Simulation</li><li>Red Team Oversight</li><li>Purple Team Testing</li><li>Vulnerability Assessment</li>
</ul>
</div>
<div>
<h4>Cloud Platforms & Security</h4>
<ul class="tag-list">
<li>AWS</li><li>Azure</li><li>Oracle Cloud</li><li>Lambda</li><li>EC2</li><li>Cloud Security Architecture</li><li>Hybrid Environments</li>
</ul>
</div>
<div>
<h4>AI/ML & Automation</h4>
<ul class="tag-list">
<li>AWS Bedrock</li><li>Large Language Models</li><li>RAG</li><li>Machine Learning</li><li>Python Automation</li><li>Custom Tool Development</li>
</ul>
</div>
<div>
<h4>Programming & Scripting</h4>
<ul class="tag-list">
<li>Python</li><li>PowerShell</li><li>Bash</li><li>SQL</li><li>YAML</li>
</ul>
</div>
<div>
<h4>Infrastructure & Systems</h4>
<ul class="tag-list">
<li>Windows Server</li><li>Linux/UNIX</li><li>Active Directory</li><li>VMware</li><li>Docker</li><li>Kubernetes</li><li>Network Architecture</li>
</ul>
</div>
<div>
<h4>Compliance & Frameworks</h4>
<ul class="tag-list">
<li>NIST 800-53</li><li>PCI-DSS</li><li>HIPAA</li><li>GDPR</li><li>CIS Benchmarks</li><li>Security Audits</li>
</ul>
</div>
<div>
<h4>Leadership & Management</h4>
<ul class="tag-list">
<li>Team Leadership (17+ reports)</li><li>MSSP Operations</li><li>Budget Management</li><li>Vendor Negotiations</li><li>Training Programs</li><li>Hiring & Mentorship</li>
</ul>
</div>
</div>
</section>
<section id="languages">
<h3>Languages</h3>
<div class="grid-list">
<div><h4>English</h4> Native speaker</div>
</div>
</section>
</body>
</html>