Professional Overview

I approach cybersecurity as a hands on craft: blend offensive testing with detection engineering and solid operational discipline. I’ve collected formal certifications, built lab infrastructure, and set a roadmap of practical skills to master from red-team tradecraft to SIEM and cloud hardening. My focus is measurable capability: reproducible tests, detection tuning, and clear remediation paths.

Certifications & Credentials

  • CompTIA Security+ certification.

  • Google Cybersecurity certification.

  • Linux Essentials certification.

  • ITIL Foundation.
    (These are the baseline credentials I rely on while building practical skillsets in offense, defense, and ops.)

Core Technical Skills (current & developing)

  • Red Teaming & Advanced Penetration Testing — adversary emulation, persistence, lateral movement, and post-exploitation hygiene.

  • SIEM & Detection Engineering (Splunk / ELK) — build detections, tune alerts to reduce false positives, and produce analyst playbooks.

  • Incident Response & Forensics — evidence capture, timeline reconstruction, and containment + recovery procedures.

  • Cloud Security (AWS) — secure identities, least privilege IAM, logging, and cloud incident scenarios.

  • Threat Hunting & Threat Intel — hypothesis-driven hunts using telemetry and enrichment feeds.

  • Secure Development Practices — SAST/DAST basics, secure code review patterns, and DevSecOps pipeline integration.

  • LLM / RAG for Security — use RAG to surface playbooks, map logs to likely root causes, and build assistant tools for SOC workflows.

  • Certifications & Continuing Education — aim for additional certs (e.g., eJPT / OSCP track later).

  •  

Outcomes Aiming For

Security is a continuous loop, test, detect, remediate, and teach. My aim is to convert certification knowledge into repeatable, operational skill: not just “what an exploit is,” but how to detect it, how to stop it, and how to teach others to do the same.

  • Reproducible red-team engagements with documented findings and prioritized remediation.

  • Tuned SIEM rules and dashboards that reduce analyst noise and improve time-to-detect.

  • Automated RAG assistants capable of surfacing exact manual excerpts or standard operating steps for field technicians.

  • A curated lab that supports continuous learning and realistic purple-team exercises.

Scroll to Top