I am currently enrolled at Western Governor's University pursuing a Bachelor's in Cybersecurity and Information Assurance, with plans to continue into a Master's program in the same field. Technology has always had my heart, and it is an incredible privilege to pursue it as a career.
My lifelong obsession with technology and curious systems has led me toward cybersecurity, a field often filled with puzzling alerts, questionable end users, and copious amounts of caffeine to investigate them. I am currently seeking opportunities to contribute within a Security Operations Center as a Tier 1 analyst or to support specialized cybersecurity teams focused on detection, investigation, and response.
Security analyst experience supporting enterprise environments with a focus on alert triage, endpoint telemetry investigation, and incident documentation. Daily work involves analyzing security alerts, validating suspicious activity, and collaborating with engineering teams to improve detection and response workflows.
Core responsibilities include:
- Investigating endpoint alerts using Microsoft Defender for Endpoint telemetry
- Correlating security events across SIEM platforms such as Splunk
- Analyzing authentication activity within Entra ID environments
- Supporting incident triage, case documentation, and escalation workflows
- Assisting with detection tuning and threat intelligence enrichment
MODUS-Intel is a Python-based OSINT enrichment and reputation analysis tool designed to rapidly evaluate Indicators of Compromise (IOCs). The scanner aggregates intelligence from multiple threat intelligence providers and produces a unified verdict to assist analysts with rapid triage during investigations.
The project was created to emulate real-world SOC enrichment workflows where analysts must rapidly pivot on suspicious indicators and consolidate threat intelligence from multiple sources during investigations.- IOC enrichment from multiple OSINT providers
- Aggregated verdict scoring across intelligence sources
- Asynchronous provider queries for faster scanning
- Human-readable terminal output designed for SOC workflows
- Debug and quiet modes for investigation flexibility
- JSON and formatted output options
python -m modus_intel.cli scan 8.8.8.8 --format pretty| Domain | Experience |
|---|---|
| Security Operations | Alert triage, investigation workflows, case documentation |
| Endpoint Detection & Response | Telemetry analysis and alert investigation using Microsoft Defender for Endpoint |
| Threat Intelligence | IOC enrichment, reputation analysis, OSINT correlation |
| Detection Engineering | Detection tuning and logic development within SIEM environments |
| Network Analysis | Packet inspection and traffic analysis using Wireshark and network tooling |
| Incident Response | Investigation timelines, root cause analysis, and documentation |
Security Monitoring: Microsoft Defender for Endpoint, Splunk
Identity & Access: Entra ID (Azure AD), CyberArk PAM
Network Security: Palo Alto Networks, Wireshark, Nmap
Operations & Ticketing: ServiceNow
Threat Intelligence & Detection: SnapAttack, Hack The Box Labs
Automation & Querying: Python, KQL