SOC Analyst | Security+ | Network+ | U.S. Army Veteran (Secret Clearance)
I investigate security incidents, build detection tools, and analyze network traffic. Seven years in the Army taught me how to troubleshoot under pressure and document findings clearly. Now I'm applying that to cybersecurity.
Currently pursuing SOC Analyst roles in both private sector and government/cleared positions.
Splunk SOC Lab - BOTSv3
Investigated 1.28M Windows Security and Sysmon events. Identified SYSTEM-level PowerShell C2 beaconing to Vultr infrastructure. Wrote SPL correlation queries and mapped findings to MITRE ATT&CK T1059.001 and T1071.001.
Microsoft Sentinel - KQL Detection Lab
Built 5 production-ready KQL detection rules for credential attacks (T1110, T1078). Added temporal correlation logic and RFC1918 IPv4/IPv6 filtering. Reduced false positives by 96% through LogonType scoping.
Active Directory Attack Detection Lab
Simulated brute force, rogue account creation, and privilege escalation attacks against a Windows domain. Built SPL queries to detect each attack pattern using Event IDs 4625, 4720, 4728, and 4732.
MalwareBox
Static malware analysis tool with entropy scoring, IOC extraction (IPs, domains, hashes), and 0-100 risk scoring. Built in Python with Flask dashboard.
PhishingDetector
Email triage tool with SPF/DKIM validation, brand impersonation detection, and malicious URL analysis. Generates risk scores and maps to SOC playbooks.
Network Traffic Analyzer
Real-time packet capture with Scapy. Detects port scans, ARP spoofing, DNS tunneling, and data exfiltration patterns.
Wireshark Network Analysis Lab
Used Nmap and Wireshark against Metasploitable2. Enumerated 21 services, documented 5 critical CVEs, provided remediation guidance.
SIEM & Detection: Splunk (SPL), Microsoft Sentinel (KQL), Windows Event Logs, Sysmon, IOC identification, alert triage
Security Tools: Wireshark, Nmap, Metasploit, Kali Linux
Scripting: Python (Flask, Scapy, automation)
Frameworks: MITRE ATT&CK, NIST CSF, PICERL
Networking: TCP/IP, DNS, HTTP/S, ARP, packet analysis
Operating Systems: Windows (Event Logs, Sysmon, PowerShell), Linux (Kali, Ubuntu)
- CompTIA Security+ (SY0-701) - February 2026
- CompTIA Network+ (N10-009) - February 2026
- CompTIA CySA+ (CS0-003) - Scheduled April 2026
U.S. Army Staff Sergeant (E6) | 7.5 Years | Honorable Discharge
Secret clearance held for 7.5 years. Supervised 300+ personnel and managed $500M+ in assets with zero loss. Veterans preference eligible.