Since childhood I have enthralled with concepts in information technology, especially security. Now that I have made a career for myself in this field, I still hold on to that same passion. I have moved quickly in this field from my beginnings as a SOC analyst, to my current role as a senior threat hunter. My hunger for growth and knowledge, both in the workplace outside continue to propel me forward in my journey to make this digital world a safer place.
As a Threat Analyst II I retain many of my previous responsibilities while being assigned new engineering projects for high-value clients and a more prominent role on the DFIR team, as our primary malware reverse engineer.
As a Threat Analyst I proactively hunt for the latest threats within our customers networks and infrastructure. I keep up with new emerging vulnerabilities, threat actors, and security risks in order to get ahead of the threat actors. I also served as a primary DFIR analyst for critical issues and confirmed breaches.
As a Dedicated SOC analyst I handled high priority clients. In this role I would investigate possible security incidents with more efficiency and a deeper understanding when compared to standard SOC services. I also functioned as a Tier II analyst, receiving preliminary incident reports and remediating the listed issues.
In this role, I worked with several different SIEM tools to manage possible security events and notify clients of suspicious activity within their network. I learned to quickly gather information, read and understand logs, and conduct OSINT investigations in order to compose incident notification reports. I was often commended for precise and verbose reports, as well as my ability to learn and grow quickly.
In this role I provided support for iPayables enterprise invoicing solution, I also functioned as a QA tester for major release versions. This role allowed me to become proficient in SQL, web-application testing/troubleshooting and issue management.
CompTIA Network+
CompTIA Security+