Cybersecurity Professional | Detection Engineering | Adversary Emulation
I specialize in bridging the gap between offensive techniques and defensive telemetry. This profile serves as a living documentation of my lab environments, detection logic, and incident response workflows.
- GCIH — GIAC Certified Incident Handler
- GSEC — GIAC Security Essentials
- GFACT — GIAC Foundational Cybersecurity Technologies
- SIEM/Logging: Splunk (SPL), Sysmon, Windows Event Logs
- Defensive: Detection Engineering, Threat Hunting, Log Analysis
- Offensive: Adversary Emulation (MITRE ATT&CK®), PowerShell Obfuscation
- SIEM Log Monitoring Lab: End-to-end detection of RDP Brute Force, LSASS dumping, and C2 activity.
- Windows10-Vulnerability-Management with Tenable: Systematic vulnerability assessment and remediation using Tenable.io.
No zero days... just relentless knowledge acquisition.

