Cybersecurity Engineer | Security Operations & Incident Response | Vulnerability Management & Risk Analysis
Specializing in enterprise security solutions, SIEM monitoring, and privileged access management across multi-state environments
View My WorkResults-driven Cybersecurity Engineer with over 3+ years of experience in incident response, vulnerability management, and enterprise security operations across multi-state environments. Currently serving as the regional IT security representative for four offices at Eide Bailly LLP. Proven success in improving organizational security posture, having increased overall compliance and defense maturity from 50% to 85% at Apple Growth Partners. Recognized for efficient and proactive risk analysis and SIEM alert response, with a strong record of strengthening security frameworks and reducing risk across hybrid infrastructures.
Expertise in SIEM monitoring, risk management, malware analysis, privileged access management, and Microsoft 365 security operations. Experienced in managing enterprise-level threat detection, vulnerability assessment, and incident response workflows to ensure consistent protection across complex environments. Skilled in implementing and maintaining security controls through Microsoft Defender XDR, Intune, and Azure AD to strengthen endpoint protection and identity management. Adept at conducting proactive risk assessments, automating remediation processes, and improving overall security posture through data-driven analysis and continuous improvement. Certified in ISC2 SSCP, CompTIA SecurityX (CASP+), CySA+, Security+, and PenTest+, demonstrating a strong commitment to professional growth and cybersecurity excellence.
SIEM monitoring, incident response, threat detection, malware analysis
Risk analysis, proactive assessments, patch management, security controls
Defender XDR, Intune, Azure AD, Endpoint Manager, MDM
BeyondTrust Bomgar, Delinea Secret Server, IAM solutions
Multi-state security operations, hybrid infrastructure, compliance monitoring
Alert response, security workflows, automated remediation, continuous improvement
Azure AD, endpoint protection, identity security, authentication systems
Data-driven analysis, security posture improvement, defense maturity enhancement
Cross-platform desktop application built with Electron-Python hybrid architecture for enterprise-grade file compression and encryption. Developed modular Python backend integrating FFmpeg, Ghostscript, and Cryptography libraries with modern Electron frontend for seamless user experience.
Architecture & Development: Designed modular backend with compression.py handling FFmpeg/Ghostscript integration, encryption.py managing AES-256 encryption via Cryptography.Fernet, database.py implementing SQLite with encrypted storage, and config.py centralizing settings management. Built responsive Electron frontend with HTML/CSS/JavaScript interfacing with Python through child processes.
Security Implementation: Implemented comprehensive security framework including AES-256 encryption for file protection, path traversal detection and prevention, filename sanitization against injection attacks, tiered file size limits (25MB-500MB based on tier), encrypted SQLite database storage, and multi-layer input validation throughout the application stack.
Performance & Features: Achieved up to 70% file size reduction across 10+ formats (MP4, AVI, MOV, MP3, WAV, JPG, PNG, PDF, DOCX, ZIP). Developed intelligent compression strategies with configurable quality settings, real-time progress tracking, batch processing capabilities, and automatic format detection with appropriate compression algorithms.
Detected, analyzed, and successfully contained a sophisticated ransomware campaign targeting enterprise users through a spoofed WSJ domain. Conducted comprehensive malware analysis in a sandboxed environment, documented MITRE ATT&CK tactics, and collaborated with Microsoft to add detection signatures to Defender definitions.
Incident Detection & Response: Identified malicious domain (wsj.pm) impersonating legitimate wsj.com through Microsoft Defender alert. Immediately isolated affected endpoint preventing network propagation. Conducted user interview and forensic analysis, confirming containment before ransomware deployment. Performed threat neutralization using Microsoft Defender, Malwarebytes, and HitManPro scanning.
Malware Analysis: Analyzed WSJ.msix package (1.02 MB containing 19 files) and embedded PowerShell script (TsxJNxhxMJfQTd.ps1) in isolated environment. Identified malicious domains (cdn41.space, netsupportsoftware.com), contacted IPs, and dropped files (Client32.ini). Documented complete MITRE ATT&CK framework mapping across 15+ techniques including defense evasion, credential access, persistence, and command & control.
Threat Intelligence & Remediation: Submitted malware samples to VirusTotal revealing 12/61 vendor detection rate initially. Provided comprehensive analysis to Microsoft Security Response Center including file hashes (MD5, SHA-1, SHA-256), behavioral analysis, registry modifications, and shell commands. Microsoft confirmed addition of detection signatures to next definition update, protecting global user base from this threat actor.
Comprehensive cybersecurity capstone project combining network architecture, Active Directory implementation, penetration testing, and technical documentation. Built a fully functional private gaming network with enterprise-grade security testing and hardening.
Network Infrastructure: Designed and configured multi-tier network topology using 3 Cisco 1921 routers, 1 Cisco 2960 switch, with VLSM subnetting (Class B). Implemented static routing, DHCP services across multiple networks, and complete physical cable management for all hardwired connections.
Server Implementation: Deployed Windows Server 2012 with Active Directory Domain Services (ADDS), created domain forest (CIS.local), managed user accounts and authentication, and configured Minecraft gaming server with Java integration.
Security Testing: Conducted comprehensive vulnerability assessments using Kali Linux tools including OpenVAS for vulnerability scanning, Metasploit Framework for exploitation, nmap for network reconnaissance, and custom tools for DHCP starvation attacks.
Improved organizational security posture from 50% to 85%. Implemented vulnerability remediation, patch management, and comprehensive security monitoring using Microsoft Defender XDR and KnowBe4.
Designed and configured multi-subnet ICS environment with SCADA systems, DMZ, and corporate network using VLSM. Implemented firewall policies, static routing, and network segmentation for critical infrastructure protection.
Installed and configured Snort on Kali Linux for intrusion detection. Created custom detection rules for phishing, unauthorized SMB access, port scanning, and malicious IP communication across multi-tier network architecture.
Conducted forensic analysis on Kali Linux VM using Autopsy. Performed data source ingestion, configured hash lookup and encryption detection modules, and analyzed file systems to identify artifacts and deleted files.
Developed comprehensive threat advisory documenting 12 MITRE ATT&CK tactics with techniques and mitigations. Covered initial access through impact stages including persistence, privilege escalation, and defense evasion strategies.
Analyzed tunneling protocols (GRE, PPTP, L2TP) and IPsec security mechanisms. Researched encapsulation techniques, authentication headers, and TLS improvements over SSL for secure network communications.