Summary
Overview
Work History
Education
Skills
Software
Certification
Work Preference
Projects
Timeline
AccountManager
Seth Steed
Open To Work

Seth Steed

Cybersecurity
McKinney,TX

Summary

Information security professional with extensive experience in safeguarding digital assets and implementing robust security frameworks. Known for strong team collaboration and achieving results, while adapting to evolving security challenges. Proficient in risk management and threat mitigation, with reliable and flexible approach.

Overview

8
8
years of professional experience
9
9

Certifications

Work History

Principal Security Analyst

Critical Start
10.2024 - Current
  • Motivated and developed a team of security analysts through mentorship and training, leading to improved team morale and increased operational efficiency.
  • Managed cross-functional teams to ensure the timely delivery of information security projects, improving overall data protection.
  • Prepared comprehensive reports on the status of the organization's information security efforts, ensuring transparency and accountability among team members.
  • Managed and motivated a security team monitoring team
  • Oversaw security awareness campaigns to educate employees on their role in safeguarding sensitive data, reducing potential insider threats.
  • Assisted executive leadership in understanding risks associated with technology decisions, enabling well-informed decision-making around IT investments.
  • Championed a culture of ongoing learning by developing training programs on relevant topics such as regulatory compliance, threat intelligence, and secure coding techniques.
  • Analyzed performance metrics to identify areas for process improvement and cost reduction.

Senior Security Analyst

Critical Start
01.2024 - 10.2024
  • Developed and implemented security policies and procedures to enhance organizational resilience.
  • Led investigations into suspected breaches to determine scope, impact, and appropriate remediation steps.
  • Mentored junior analysts, fostering skill development and knowledge sharing within the team.
  • Prepared detailed reports on security incidents, presenting findings to stakeholders for informed decision-making.
  • Ensured data integrity with regular audits, identifying potential risks and addressing them proactively.
  • Conducted risk assessments to identify potential compliance gaps and recommend corrective actions.

Junior Security Analyst

Critical Start
10.2022 - 01.2024
  • Assisted in conducting internal audits to assess adherence to security standards and regulations.
  • Reduced potential cyber threats through continuous monitoring of network traffic and analyzing logs for suspicious activities.
  • Identified risks in application code through static and dynamic analysis tools, ensuring secure software development practices were followed.
  • Researched emerging threats and trends, providing insights for proactive risk management strategies.
  • Conducted forensic investigations into security incidents, providing detailed reports for further analysis and remediation efforts.
  • Provide initial insights to the incident response team through findings during the triage phase of the security incident.

Systems Administrator II

General Dynamics Information Technology
04.2022 - 10.2022
  • Interpreted NIST SP 800-53 as a reference to select and implement security controls, establishing a layered defense to safeguard information assets and user accounts accessing Department of State systems. Notable controls included:
  • - Deployed multi-factor authentication (MFA) across all user accounts to reduce the likelihood of a successful account compromise
  • - Implemented real-time monitoring and threat detection tools, resulting in a 25% decrease in average incident response time.
  • - Introduced regular vulnerability assessments and remediation efforts, reducing critical vulnerabilities by 50% within six months.
  • - Redesigned and delivered comprehensive security awareness training programs, increasing employee knowledge and reducing URL click events for users within the organization by 30% while also increasing the number of emails reported as phishing by over 100%

IT Project Manager

Repair Pros
05.2018 - 04.2022
  • Use quantitative assessments to determine what projects and functions deliver value to the organization. Tailored overhead cost reduction to decrease the spending within the Information Technology department by 20% without sacrificing the performance of IT functions.
  • Initiated and coached training regimens for new technicians to facilitate a more profound knowledge of IT concepts to new technicians with the aim of reducing employee turnover.
  • Arranged face-to-face communication with municipality leaders to keep the communication chain open about any project updates or milestones that may influence business decisions. Listened to stakeholder feedback to build rapport and reduce client turnover by 25% compared to previous years.
  • Authored and established comprehensive business continuity plans, identifying critical assets, prioritizing based on immediate organizational function, and outlining recovery activities for natural disasters and breaches; refined clear guidelines for emergency response and minimized downtime to availability while ensuring confidentiality during crises.

Education

Bachelor of Science - Cybersecurity And Information Assurance – B.S.

Western Governors University
Salt Lake City, UT
09-2025

Skills

  • Threat intelligence
  • Security information and event management
  • Security awareness training
  • Incident response
  • Disaster recovery
  • Penetration testing
  • NIST SP 800-53
  • ISO: 27001
  • Teamwork and collaboration
  • Regulatory compliance
  • Leadership
  • Cryptography

Software

Splunk

Python

Cortex XDR

Microsoft Defender for Endpoint

CrowdStrike

No-SQL Database (Elastic)

SQL Database (MySQL)

Certification

  • Certified Information Systems Security Professional (CISSP), (ISC2), 2023
  • CompTIA Advanced Security Practitioner (CASP+), 2025
  • Certified Cloud Security Professional (CCSP), (ISC2), 2025
  • CompTIA Cybersecurity Analyst (CySA+), 2022
  • CompTIA Pentest+, 2025
  • CompTIA Security+, 2022
  • CompTIA Network+, 2025
  • CompTIA Linux+, 2025
  • Axelos ITIL4, 2025

Work Preference

Work Type

Full Time

Location Preference

On-SiteRemote

Projects

T-Pot Honeypot Deployment and SIEM Integration

Implemented a full-featured honeypot environment using the T-Pot platform, which integrates multiple deception technologies such as Log4Pot, Snare, DDoSPot, Cowrie, and others. The environment emulated various vulnerable services to attract, detect, and log adversarial behavior in a controlled setting.

To capture and analyze traffic:

  • Utilized FATT (Fingerprinting the Attack Traffic) with PyShark to process PCAP files, extract session metadata, and perform protocol-level fingerprinting.
  • Deployed Suricata for real-time deep packet inspection (DPI), generating high-fidelity IDS/IPS alerts and protocol logs based on defined rulesets (e.g., Emerging Threats).

For centralized log management and threat visualization:

  • Integrated the honeypot output with the Elastic Stack (Elasticsearch, Logstash, Kibana).
    Logstash was configured to parse and normalize logs from multiple honeypot sensors.
    Elasticsearch indexed the enriched data for querying and correlation.
    Built custom Kibana dashboards for visualizing attack trends, including:
    Source geolocation (via GeoIP enrichment)
    Top destination ports targeted
    Frequency of attack signatures
    IP reputation overlays

Conducted OSINT and threat enrichment using:

  • VirusTotal: to scan and correlate malicious indicators (e.g., IPs, domains).
  • AbuseIPDB: to determine historical reputation and classification of attacker IPs.
  • Isolated VM analysis: to investigate suspicious connections and payloads in a safe environment.

This intelligence was then leveraged to design tailored IPS rules for systems like Suricata, improving network defense capabilities based on observed TTPs (Tactics, Techniques, and Procedures).

Overall, the project demonstrated end-to-end threat collection, enrichment, analysis, and actionable defense automation using open-source tools in a production-like setting.


Capstone Project – Zero Trust Architecture Implementation for "ORG Fiction"

Led the end-to-end design and deployment of a Zero Trust Security Framework for a simulated enterprise environment (“ORG Fiction”), focused on aligning with modern cybersecurity principles to minimize implicit trust and reduce the attack surface.

Key Project Objectives:
  • Assessment of Existing Infrastructure: Conducted a thorough evaluation of the fictional organization's network topology, access controls, authentication mechanisms, and data flows to identify security gaps and legacy trust assumptions.
  • Zero Trust Strategy Design:
    Defined a comprehensive Zero Trust policy architecture tailored to the organization's operational model and threat landscape.
    Developed an identity-centric access control model incorporating Role-Based Access Control (RBAC) and Multi-Factor Authentication (MFA) to enforce least privilege.
    Designed and documented network micro-segmentation strategies using VLANs, software-defined networking (SDN), and host-based firewalls to contain lateral movement.
    Integrated continuous monitoring and policy enforcement leveraging tools for real-time logging, anomaly detection, and adaptive access decisions.
Deliverables and Outcomes:
  • Delivered a Zero Trust implementation roadmap, including phased deployment steps, technology recommendations, and risk mitigation strategies.
  • Developed a proof-of-concept (PoC) lab environment demonstrating key Zero Trust components, including policy enforcement points, identity providers (IdPs), segmentation policies, and monitoring integrations.
  • The final architecture demonstrated measurable improvements in security posture, reducing exposure to insider threats, unauthorized access, and lateral network traversal.

This project showcased the practical application of Zero Trust principles using a layered defense model, supporting both executive-level strategy and hands-on technical implementation.

Timeline

Principal Security Analyst

Critical Start
10.2024 - Current

Senior Security Analyst

Critical Start
01.2024 - 10.2024

Junior Security Analyst

Critical Start
10.2022 - 01.2024

Systems Administrator II

General Dynamics Information Technology
04.2022 - 10.2022

IT Project Manager

Repair Pros
05.2018 - 04.2022

Bachelor of Science - Cybersecurity And Information Assurance – B.S.

Western Governors University