Introduction

Hi there! If you’re a recruiter, hiring manager, or just someone curious about my work, welcome. Below is a high-level summary of what I’ve been up to in cybersecurity. If you would like the full suit and tie version, just shoot me an email and I’ll send over a copy.


🧠 Current Role: Triage Specialist @ Concierge Security Firm

  • Investigate phishing attempts, scareware, and suspicious device behavior.
  • Remotely assist macOS and Windows clients to identify and respond to incidents.
  • Analyze file hashes and EDR data, escalating threats when necessary.
  • Recommend device/network hardening techniques based on client risk profiles.
  • Document incidents and assist in root cause investigations as part of the IR team.

🛠 Home Lab & Personal Projects

  • Deployed OpenCTI with integrated threat intelligence sources like VirusTotal and OTX.
  • Built a Python-based phishing analyzer CLI tool using VirusTotal’s API.
  • Built out a Proxmox-based virtual lab with pfSense, Security Onion, and test VMs.
  • Conduct ongoing break/fix experiments to test detection and response scenarios.

🧭 Certifications & Education

  • CompTIA Security+
  • GIAC GSEC (Security Essentials)
  • GIAC GCIH (Incident Handler)
  • GIAC GFACT (Foundational Cybersecurity Technologies)
  • Actively researching online programs for malware analysis and exploit development

🔍 What I'm Looking For

I love the work I do now, but I'm looking to pivot deeper into threat intelligence or security research. I'm especially drawn to roles focused on digging into IOCs, reversing malware, and building threat-informed defenses.

For the real full resume, just reach out and I’ll happily send it over.
Let’s connect.