Cybersecurity Manager | Threat Hunter | Security Automation Enthusiast
With 25+ years in IT and a passion for security automation, I specialize in threat hunting, incident response, and building robust defense systems. From helpdesk to security leadership, I've learned that the best defense combines technical expertise with strategic thinking.
Experience how I approach different security incidents. Choose a scenario and step through my real-world investigation methodology.
Follow my step-by-step approach to analyzing suspicious emails, from header analysis to threat classification and incident response.
Navigate through investigating suspicious login activity, analyzing access patterns, and implementing containment measures.
Experience endpoint forensics, process tree analysis, and malware containment strategies in a real-world scenario.
Proactive identification of threats through systematic investigation and analysis of security data.
Rapid containment and investigation of security incidents, from phishing to malware outbreaks.
Expert analysis of phishing attempts, email authentication, and social engineering attacks.
Investigation of compromised accounts, credential analysis, and access management.
Endpoint forensics, process analysis, and malware containment strategies.
Building tools and processes to scale security operations and reduce manual overhead.
Chronicling my journey from sysadmin to Infrastructure as Code, built with Azure Static Web Apps and GitHub Actions.
→ Read My BlogInfrastructure as Code projects, automation scripts, and security tools.
→ Check Out My GithubProfessional certifications and continuous learning in cybersecurity.
Interested in discussing cybersecurity, automation, or potential opportunities? I'd love to hear from you.