About Me
I’m a cybersecurity analyst with 4–5 years of combined experience across public sector environments.
- Incident response, detection logic, SOC triage, alert tuning
- Creator of documentation, triage guides, and analyst workflow playbooks
- Familiar with CMMC and NIST 800-171 frameworks
- Exploring DevSecOps: Terraform, Azure Security, Secure Pipelines
- Enjoy translating detection logic into actionability for analysts
I started my career managing technical support teams, moved into mobile application project management, and eventually found my path in infrastructure, sysadmin, and cybersecurity roles — where I thrive in operations, clarity, and collaborative problem-solving.
Skills
Technical:
- SOC Operations, Threat Detection, Alert Tuning, DFIR
- Microsoft Sentinel, Splunk (read-only), Arkime, Wireshark, ServiceDesk
- Azure Security (RBAC, Identity, Defender), Infrastructure as Code (Terraform)
- PowerShell, Markdown, YAML (exposure only), basic Python
- KQL (basic to intermediate) for Sentinel investigation queries
Soft Skills:
- Strong documentation writer: playbooks, workflows, triage guides
- Process-driven with a knack for streamlining analyst workflows
- Cross-team communicator and trusted compliance partner
TryHackMe Badges
I’ve just started playing around with TryHackMe, so don’t judge lol.