A result-oriented DevOps Career Pathway (CompTIA Security+, Certified Ethical Hacker (CEH), and Splunk Core User) trained professional; gained expertise in network monitoring and intrusion detection analysis using various computer network defense tools, including intrusion detection/prevention systems, firewalls, and host-based security systems. Well conversant in the life cycle of network threats, attacks, attack vectors, and methods of exploitation with an understanding of intrusion set tactics, techniques, and procedures as well as TCP/IP, common networking ports and protocols, traffic flow, system administration, defense-in-depth, and common security elements. Demonstrated knowledge of Risk Management Framework (RMF) Package, Artifacts, and SOPs as well as FISMA Compliance, NIST SP 800-53 Controls, and Cloud security. Capable of performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and managing the incident response process. Acquired skills in tuning and configuration of Enterprise Splunk and Splunk App for Enterprise Security (ES). Excellent knowledge of security frameworks (NIST, MITRE, OWASP, SANS CWE), secure coding practices, information security principles & architecture, and industry-specific auditory frameworks.