π-Welcome to My Portfolio!
About Me
Iβm a cybersecurity professional with hands-on experience supporting enterprise SOC operations for a large public-sector organization. I work daily with SIEM, EDR, and network security tools to detect threats, analyze phishing campaigns, correlate indicators of compromise, and support incident response across thousands of endpoints and users.
My background combines formal cybersecurity education with real-world defensive operations, including threat hunting, log analysis, security automation, and endpoint hardening aligned with CIS and CJIS standards. I enjoy turning raw security data into actionable insightsβwhether thatβs through Splunk dashboards, PowerShell automation, or improving detection and response workflows.
Iβm actively building and documenting projects in my GitHub portfolio to demonstrate practical security skills, continuous learning, and a strong blue-team mindset, with a focus on SOC operations, incident response, and cyber defense.
π Education
Bachelor of Science in Cybersecurity & Information Assurance (In Progress)
Western Governors University β Salt Lake City, UT
Expected Graduation: May 2026
Focused on defensive security, incident response, and cloud security. Coursework emphasizes Linux administration, cryptography, network defense, security governance, and hands-on cyber defense aligned with CySA+ and PenTest+ domains.
Associate of Science in Cybersecurity
Pasadena City College β Pasadena, CA
Graduated: December 2024 | GPA: 3.6
Completed extensive hands-on labs in ethical hacking, digital forensics, Windows and Linux administration, enterprise networking, Python scripting, and SQL.
Earned Certificates of Achievement in Cybersecurity, Systems & Network Administration, and Help Desk.
Department of Homeland Security (DHS) β Cybersecurity Analyst Seminar
Completed: January 2026
Completed DHS-aligned cybersecurity training focused on federal threat detection, risk analysis, and incident response. Topics included network protocol analysis (TCP/IP, SMB), phishing and social engineering attacks, malware analysis, MITRE ATT&CK TTP identification, and core security principles (CIA triad).
π Certifications & Competitions
Certifications
- GIAC Security Essentials (GSEC)
- ISC2 SSCP
- CompTIA Network+
- CompTIA A+
- LPI Linux Essentials
- CompTIA Project+
- CompTIA CySA+ (Expected January 2026)
Competitions
- SentinelOne Purple AI ThreatOps Challenge β π₯ 1st Place
- SentinelOne EDR ThreatOps Challenge β π₯ 3rd Place
π» Showcasing my Homelab and Projects
π-Splunk Detection Queries
π-Network Lab
More Coming Soon
π§ Technical Skills
| π Security Domains | βοΈ Tools, Platforms & Technologies |
|---|---|
| π₯οΈ Operating Systems | Windows 10/11, Linux, macOS, Chrome OS |
| π€ Identity & Access Management (IAM) | Active Directory, Azure AD, Conditional Access, PowerShell |
| π‘οΈ Endpoint Detection & Response (EDR) | SentinelOne, Carbon Black, Malwarebytes Nebula |
| π SIEM & Security Monitoring | Splunk, Microsoft Defender, Proofpoint TRAP |
| π¨ Incident Response & Malware Analysis | ANY.RUN, VirusTotal, Hybrid Analysis, Joe Sandbox, Intezer Analyze |
| π¬ Email & Phishing Analysis | MXToolbox, MailHeader Analyzer, DNSChecker, Proofpoint Awareness |
| π Threat Intelligence & OSINT | MITRE ATT&CK, Cisco Talos, SANS ISC, Threat Connect |
| π Network & Protocol Analysis | Wireshark, Nmap, Tcpdump |
| π΅οΈ OSINT & Exposure Discovery | Shodan, Have I Been Pwned, DomainTools, WHOIS, MXToolbox |
| π§± Hardening, Baselines & Compliance | CIS Benchmarks, Windows Security Baselines, CJIS Compliance |
| βοΈ Automation & Scripting | PowerShell, Intune, SQL |
| π‘ Network & Endpoint Management | Intune, SentinelOne Dynamic Groups |
| π Dashboards & Reporting | Splunk Custom Dashboards, SentinelOne Policy Matrix, Excel, SharePoint |
| π Account & Credential Security | Active Directory Audits, On-Prem Password Manager |
π§ Soft Skills
- Communicate security findings clearly to both technical teams and non-technical stakeholders through reports, dashboards, and briefings
- Apply critical thinking and analytical reasoning to investigate alerts, assess risk, and support incident response decisions
- Maintain strong attention to detail when documenting incidents, validating indicators, and following security procedures
- Manage time effectively while triaging multiple alerts and meeting response deadlines in high-pressure environments
- Adapt quickly to evolving threats, tools, and workflows in fast-paced IT and SOC operations
- Collaborate across SOC, IT, and security teams to resolve incidents and improve defensive posture
- Self-driven learner who continuously improves technical skills through labs, certifications, and real-world practice
- Demonstrate leadership and initiative by contributing to security awareness efforts, process improvements, and small-scale projects