Four years of experience as a cybersecurity professional, United States Marine Corps veteran, and dedicated hardworking professional with experience in Cyber Operations at all levels of information technology. Highly passionate about education in cybersecurity and committed to empowering others with knowledge, ensuring that together, we can foster a more secure and resilient digital world.
Roles: Host Analyst, Network Analyst, Crew Lead
· Performed enable hardening and hunt operations.
· Performed vulnerability assessments for production enterprise, local area, and tactical level networks.
· Python, PowerShell, and Bash Scripting .
· Innovated new capabilities by improving processes and procedures in conducting network and host-based forensics.
· Windows and Linux forensics.
· Created and presented products to customers and identifying, isolating, and eradicating identified malicious threats.
· Experience with multiple CTI Frameworks and reporting platforms; MITRE ATT&CK, Diamond Model, Cyber Kill Chain, TLP.
· Skilled in leading a team’s host and network analysis capability through hunt operations.
· Planned cyber operations missions across an array of mission types to include incident response, hunt operations, and enable hardening.
· Proficient in performing cyber threat emulation.
· Assisted with enable hardening and reconnaissance/hunting operations.
· Installed, configured, and maintained all systems
· Trained inbound Marines on processes, installations, and configurations of fly away kit, creating continuity.
· Created PowerShell and Bash scripts to enumerate Windows, Linux and VMware ESXi.
· Proficient using Splunk, Security Onion, and HX and a variety of other tools for enterprise data collection.
DoD Cyberspace Operations planning and execution
Digital Forensics Analyst
Network Security & Monitoring
Incident Response
Intelligence driven Threat Hunting
Cyber Threat Emulation
Computer and Network Forensics
Malware Analysis
Low level protocol and packet analysis
Network Traffic Analysis
Memory Analysis
Linux and Windows Administration
Security Information and Event Management
Risk Management Framework production
PowerShell/BASH/Python Scripting Automation
Leading and coordinating a team of analysts
- Joint Cyber Analysis Course (JCAC)
- Discovery and Counter-Infiltration Course (DCI)
- Cyber Operations Specialists Course (COSC)
- CompTIA Security + (Exp. 2025)
- Advanced Network Forensics: Threat Hunting, Analysis and Incident Response (SANS 572)