I'm a technologist transitioning into infrastructure engineering and cybersecurity. My background spans web development and IT support, and I'm now building toward roles in cloud security, platform engineering, and security operations. I approach systems thinking holistically β how things connect, how they fail, and how to make them observable and defensible.
I'm currently completing the TKH Innovation Fellowship 2026 (cybersecurity cohort) and running a self-hosted homelab on Proxmox where I build, break, and monitor things.
- π‘οΈ Security Operations β SIEM, IDS/IPS, alert triage, incident response
- βοΈ Cloud Security β AWS & Azure architecture, IAM, GuardDuty, Security Hub
- π₯οΈ Linux & Infrastructure β system administration, hardening, scripting
- π Networking β OSI model, TCP/IP, subnetting, DNS, packet analysis
- π§ DevSecOps β Docker, Kubernetes, Terraform, CI/CD pipeline security
- π€ Automation β Bash and Python scripting for security and ops workflows
- SOC Homelab β Wazuh + Suricata + Zeek + Grafana + TheHive + Shuffle (SOAR) running on Proxmox VMs and LXCs
- Detection Engineering β custom Suricata rules, ATT&CK-mapped alerts, Atomic Red Team attack simulations
- Cloud Security Projects β secure auth architecture deployed on AWS and Azure with IAM least privilege, WAF, and GuardDuty
- OverTheWire Bandit β grinding Linux command fluency levels 0β20
| Layer | Tools |
|---|---|
| Virtualization | Proxmox VE |
| VMs / LXCs | Kali Linux, Ubuntu Server, Docker LXC, Jellyfin LXC |
| SIEM / Monitoring | Wazuh, Splunk, Grafana + Prometheus |
| Network Security | Suricata (IDS/IPS), Zeek (traffic analysis), Wireshark, tcpdump |
| Incident Response | TheHive (case management), Shuffle (SOAR), Cortex |
| Endpoint | LimaCharlie (EDR), Atomic Red Team |
| AppSec | Burp Suite, DVWA, WebGoat, OWASP ZAP |
- π ISCΒ² CC β in progress
- βοΈ AWS SAA-C03 β in progress
- πͺ AZ-104 β in progress
- π‘οΈ CompTIA Security+ β planned (Q4 2026)