Trae M.
Cybersecurity Professional – Threat Intelligence & Incident Response
Location: Georgia
LinkedIn
Professional Summary
GIAC-certified cybersecurity professional with a strong focus in threat intelligence, threat hunting, and digital forensics. Skilled in uncovering adversary infrastructure, analyzing phishing campaigns, and triaging endpoint threats. Proven experience supporting high-net-worth individuals and executives through proactive threat mitigation and investigation. Known for blending technical depth with strong client communication and investigative precision.
Skills & Tools
- Threat Detection & Analysis: Threat hunting, phishing investigations, adversary infrastructure analysis, EDR triage, network traffic analysis, .eml and header forensics, OSINT enrichment
- Platforms & Tools: SentinelOne, Carbon Black, Tri.Age, Hybrid Analysis, Nessus, Nmap, Wireshark, Microsoft Intune, VMware ESXi, pfSense, Security Onion, Metasploit, Hashcat, John the Ripper
- Scripting & Automation: Python, PowerShell, Bash
- Systems: Windows, Linux, macOS, Dell PowerEdge servers, Cisco networking gear
- Soft Skills: Security awareness training, client guidance during IR, technical documentation, process optimization
Education & Certifications
- SANS Technology Institute – Veterans Scholarship Academy
- GIAC Certified Incident Handler (GCIH)
- GIAC Security Essentials (GSEC)
- GIAC Foundational Cybersecurity Technologies (GFACT)
- CompTIA Security+ ce
Projects & Research
- Threat Intelligence & Infrastructure Mapping: Led research into phishing infrastructure, uncovering domains using Cloudflare masking, WHOIS obfuscation, and linked subdomains. Contributed to threat reports by decoding obfuscated scripts and mapping campaigns using OSINT.
- Home Lab: Built and maintain a hands-on lab using ESXi, pfSense, and Security Onion. Used to simulate network threats, deploy EDRs, and refine detection strategies.
- Capture the Flag (CTF): Completed TryHackMe’s Junior Penetration Tester pathway. Ranked in the top 10% of users. Developed practical skills in exploitation, privilege escalation, and adversary emulation.
Experience
Triage Specialist – Concierge Cybersecurity Firm (Remote)
April 2024 – Present
- Triage 65+ alerts per day and escalate incidents based on real-time analysis
- Perform phishing investigations through .eml/header analysis and identify spoofed infrastructure
- Support IR cases by documenting findings and mapping TTPs to MITRE ATT&CK
- Conduct port scans and threat surface evaluations for client environments
Tier I Help Desk – Municipal IT Department
August 2023 – March 2024
- Supported over 500 endpoints and resolved daily technical/security issues
- Hardened systems through Intune policy tuning and Carbon Black configuration
- Imaged and deployed 200+ endpoints with strict security controls