Cybersecurity
Senior Security Analyst · Threat Hunting & Detection Engineering
What I Do
I’m skilled at managing chaos, but my true talent is in preventing it altogether. Driven and efficient Security Engineer with 15+ years in IT and networking, specializing in rapid incident response and penetration testing. Extremely adept in firewall administration, Active Directory, and file share security. Experienced in endpoint detection, vulnerability management. I train with the latest technology to enhance resiliency, efficiency and automation.
- Tier‑2 analyst for a managed SOC: triage, validate, and escalate complex alerts across multiple client environments.
- Develop & tune detection rules to reduce noise and increase true‑positive rates.
- Conduct threat hunts and investigate endpoint, network, and cloud activity.
- Collaborate with engineers to improve rules, cut false positives, and harden environments.
- Build playbooks, SOPs, and runbooks to streamline response and onboarding.
Highlights
- Reduced SOC alert noise and improved detection quality through rule tuning & context enrichment.
- Implemented Corelight/Suricata to deliver advanced network visibility and anomaly detection.
- Deployed Varonis to secure hundreds of thousands of sensitive file shares within months.
- Enforced DMARC to block malicious emails and enhance security posture for both the company and customers.
- Have triaged many incidents and stopped attackers in their tracks in real time.
Aspirations
Keep sharpening threat‑hunting and detection‑engineering skills while mentoring others in SOC environments. Long‑term, lead a proactive blue team that drives measurable risk reduction through automation, purple‑team collaboration, and community contributions.
Certifications (PDF)
Preview – CompTIA PenTest+ (CE)

