>> DEFENSIVE CYBERSECURITY & INFORMATION ASSURANCE
Specializing in SOC Operations, Threat Analysis, and Vulnerability Management. Bridging the gap between computer science fundamentals and modern security defense.
Western Governors University (WGU)
University of Illinois Chicago (UIC)
Splunk, ELK Stack, Azure Sentinel
Tenable Nessus, Qualys, OpenVAS
Wireshark, Nmap, Snort/Suricata, FW
Python, Bash, PowerShell
MITRE ATT&CK, NIST CSF, OWASP
EDR Solutions, Sysmon, Osquery
Deployed an ELK Stack (Elasticsearch, Logstash, Kibana) to ingest and visualize logs from a Windows Active Directory environment. Configured alerts for brute force attempts and privilege escalation.
Created an isolated environment using REMnux and FlareVM to safely detonate and analyze suspicious executables. Performed static analysis (strings, hashes) and dynamic analysis.
Conducted a full vulnerability scan against a target network using Nessus. Categorized findings by CVSS score, removed false positives, and drafted a remediation plan for stakeholders.
Developed a Python script that aggregates IP reputation data from AbuseIPDB and AlienVault OTX, automatically updating firewall blocklists to prevent communication with known C2 servers.