Trae M.

Cybersecurity Professional – Threat Intelligence & Incident Response

Location: Georgia
LinkedIn


Professional Summary

GIAC-certified cybersecurity professional with a strong focus in threat intelligence, threat hunting, and digital forensics. Skilled in uncovering adversary infrastructure, analyzing phishing campaigns, and triaging endpoint threats. Proven experience supporting high-net-worth individuals and executives through proactive threat mitigation and investigation. Known for blending technical depth with strong client communication and investigative precision.

Skills & Tools

  • Threat Detection & Analysis: Threat hunting, phishing investigations, adversary infrastructure analysis, EDR triage, network traffic analysis, .eml and header forensics, OSINT enrichment
  • Platforms & Tools: SentinelOne, Carbon Black, Tri.Age, Hybrid Analysis, Nessus, Nmap, Wireshark, Microsoft Intune, VMware ESXi, pfSense, Security Onion, Metasploit, Hashcat, John the Ripper
  • Scripting & Automation: Python, PowerShell, Bash
  • Systems: Windows, Linux, macOS, Dell PowerEdge servers, Cisco networking gear
  • Soft Skills: Security awareness training, client guidance during IR, technical documentation, process optimization

Education & Certifications

  • SANS Technology Institute – Veterans Scholarship Academy
    • GIAC Certified Incident Handler (GCIH)
    • GIAC Security Essentials (GSEC)
    • GIAC Foundational Cybersecurity Technologies (GFACT)
  • CompTIA Security+ ce

Projects & Research

  • Threat Intelligence & Infrastructure Mapping: Led research into phishing infrastructure, uncovering domains using Cloudflare masking, WHOIS obfuscation, and linked subdomains. Contributed to threat reports by decoding obfuscated scripts and mapping campaigns using OSINT.
  • Home Lab: Built and maintain a hands-on lab using ESXi, pfSense, and Security Onion. Used to simulate network threats, deploy EDRs, and refine detection strategies.
  • Capture the Flag (CTF): Completed TryHackMe’s Junior Penetration Tester pathway. Ranked in the top 10% of users. Developed practical skills in exploitation, privilege escalation, and adversary emulation.

Experience

Triage Specialist – Concierge Cybersecurity Firm (Remote)

April 2024 – Present

  • Triage 65+ alerts per day and escalate incidents based on real-time analysis
  • Perform phishing investigations through .eml/header analysis and identify spoofed infrastructure
  • Support IR cases by documenting findings and mapping TTPs to MITRE ATT&CK
  • Conduct port scans and threat surface evaluations for client environments

Tier I Help Desk – Municipal IT Department

August 2023 – March 2024

  • Supported over 500 endpoints and resolved daily technical/security issues
  • Hardened systems through Intune policy tuning and Carbon Black configuration
  • Imaged and deployed 200+ endpoints with strict security controls