Cybersecurity leader and researcher with 15+ years of experience across government, military, and private sector. Currently serving as Director of Threat Research, focusing on emerging threats and advanced defensive strategies for Managed Detection and Response.
π― Mission: Staying ahead of cyber threats through continuous research, innovation, and team leadership
π¬ Focus: Advanced threat analysis, security engineering, and building resilient defense systems
π Philosophy: Lifelong learner committed to sharing knowledge and elevating the cybersecurity community
π Threat Research & Analysis
ποΈ Security Engineering
|
π₯ Team Leadership
π¨ Incident Response
π€ Machine Learning in Security
|
π― Everyday Learning
ββ Lifelong learner committed to staying current in cybersecurity
ββ Continuous skill development and knowledge expansion
π Naval Postgraduate School
ββ Information Systems Security Engineering Post-Graduate Certificate
π Penn State University
ββ B.S. Security & Risk Analysis
ββ B.S. Information Science and Technology
π¬ Published cybersecurity researcher and threat hunter
π€ Regular speaker at security conferences including ILTACON, Blackhat (sponsored), and others
πͺ Led cybersecurity teams at Department of Defense
πΊ Expert contributor to media outlets and podcasts
- CEH (Certified Ethical Hacker)
- CompTIA (A+, Network+, Security+)
- AWS & Azure Various cloud certifications
- CISSP (Exam pass only so far...)
πΊπΈ English (Native)
π«π· French (Intermediate)
π·πΊ Russian (Basic)
π§ Security Tools
Network Analysis : Wireshark, Nmap, Masscan
Penetration Testing : Metasploit, Burp Suite, OWASP ZAP
Command Line : BASH, PowerShell, Linux Shell
Forensics : Volatility, Autopsy, YARA
π» Programming Languages
Primary: Python, TypeScript/JavaScript, Go, SQL
Secondary: BASH, PowerShell, C++, C#, LUA
π Networking & Security Infrastructure
Core Networking : Routing, Switching, Network Protocols
Security Appliances : Firewalls, IDS/IPS, SIEM, MDR
Network Security : VPNs, Network Segmentation, Traffic Analysis
π Digital Forensics & Analysis
Static Analysis : Malware reverse engineering, binary analysis
Dynamic Analysis : Sandbox analysis, behavioral monitoring
Network Forensics : Packet capture analysis, traffic reconstruction
Malware Analysis : Threat attribution, IOC extraction
Live Response : Incident containment, evidence preservation
π οΈ DevOps & Infrastructure
Containers: Docker, Kubernetes
IaC: Terraform, CloudFormation
CI/CD: GitHub Actions, Jenkins
Others: Virtualization, Databases, Git