SOC Analyst | Security+ | Network+ | U.S. Army Veteran (Secret Clearance)
I investigate security incidents, build detection tools, and analyze network traffic. Seven years in the Army taught me how to troubleshoot under pressure and document findings clearly. Now I'm applying that to cybersecurity.
Currently pursuing SOC Analyst roles in both private sector and government/cleared positions.
Microsoft Sentinel - KQL Detection Lab
Built 5 production-ready KQL detection rules for credential attacks (T1110, T1078). Added temporal correlation logic and RFC1918 IPv4/IPv6 filtering. Reduced false positives by 96% through LogonType scoping.
Splunk SOC Lab - BOTSv3
Investigated 1.28M Windows Security and Sysmon events. Identified SYSTEM-level PowerShell C2 beaconing to Vultr infrastructure. Wrote SPL correlation queries and mapped findings to MITRE ATT&CK T1059.001 and T1071.001.
Active Directory Attack Detection Lab
Simulated brute force, rogue account creation, and privilege escalation attacks against a Windows domain. Built SPL queries to detect each attack pattern using Event IDs 4625, 4720, 4728, and 4732.
SIEM & Detection: Splunk (SPL), Microsoft Sentinel (KQL), Windows Event Logs, Sysmon, IOC identification, alert triage
Security Tools: Wireshark, Nmap, Metasploit, Kali Linux
Scripting: Python (Flask, Scapy, automation)
Frameworks: MITRE ATT&CK, NIST CSF, PICERL
Networking: TCP/IP, DNS, HTTP/S, ARP, packet analysis
Operating Systems: Windows (Event Logs, Sysmon, PowerShell), Linux (Kali, Ubuntu)
- CompTIA Security+ (SY0-701) - February 2026
- CompTIA Network+ (N10-009) - February 2026
- CompTIA CySA+ (CS0-003) - Scheduled April 2026
U.S. Army Staff Sergeant (E6) | 7.5 Years | Honorable Discharge
Secret clearance held for 7.5 years. Supervised 300+ personnel and managed $500M+ in assets with zero loss. Veterans preference eligible.