Introduction
Hi there! If you’re a recruiter, hiring manager, or just someone curious about my work, welcome. Below is a high-level summary of what I’ve been up to in cybersecurity. If you would like the full suit and tie version, just shoot me an email and I’ll send over a copy.
🧠 Current Role: Triage Specialist @ Concierge Security Firm
- Investigate phishing attempts, scareware, and suspicious device behavior.
- Remotely assist macOS and Windows clients to identify and respond to incidents.
- Analyze file hashes and EDR data, escalating threats when necessary.
- Recommend device/network hardening techniques based on client risk profiles.
- Document incidents and assist in root cause investigations as part of the IR team.
🛠 Home Lab & Personal Projects
- Deployed OpenCTI with integrated threat intelligence sources like VirusTotal and OTX.
- Built a Python-based phishing analyzer CLI tool using VirusTotal’s API.
- Built out a Proxmox-based virtual lab with pfSense, Security Onion, and test VMs.
- Conduct ongoing break/fix experiments to test detection and response scenarios.
🧭 Certifications & Education
- CompTIA Security+
- GIAC GSEC (Security Essentials)
- GIAC GCIH (Incident Handler)
- GIAC GFACT (Foundational Cybersecurity Technologies)
- Actively researching online programs for malware analysis and exploit development
🔍 What I'm Looking For
I love the work I do now, but I'm looking to pivot deeper into threat intelligence or security research. I'm especially drawn to roles focused on digging into IOCs, reversing malware, and building threat-informed defenses.
For the real full resume, just
reach out
and I’ll happily send it over.
Let’s connect.