CONTACT

GitHub

LinkedIn

LeetCode


TECHNICAL SKILLS

Cyber Threat Analyst Tools (NETWORK)

Elasticsearch, Kibana Discovery, Gabriel Nimbus (Army BDP), Caspian Pigeon (BDP), Caspian Schooner, Caspian Clipper, Splunk Cloud - Victoria Experience and Splunk Enterprise

Cyber Threat Analyst Tools (SYSTEM)

Microsoft Defender Endpoint, Menlo (CBII), Forescout, Infoblox, (Army) - TYCHON/AESS

Intelligence Tools / Operations

Recorded Future, CrowdStrike Intelligence, Pulse (SECRET and TS/SCI Level), M3, ALICE (NCIS), IKE (SECRET and TS/SCI)

Digital Forensics

Eric Zimmerman's Tools (net9), Volatility 2 & 3, MemProcFS, WinDbg, Windows (JCWA) ROBOTICKNIGHT, Sysinternals Suite, Microsoft PowerToys, FTK Imager, Arsenal Image Mounter, KAPE, NirSoft BrowsingHistoryView, RegRipper, TestDisk / PhotRec, Thumbscache Viewer, Thumbs Viewer

Information Security

ACAS, Tennable Nessus, Apptega (Governance, Risk, and Compliance Framework)

Networking, System Management, Ticketing

AESMP/AESD, Microsoft Server 2019, ServiceNow (ITSM+, SecOps), Redmine, Solar Winds, Remedy (BMC Helix ITSM)

Developer Tools - Front-End | Templates

HTML, CSS, Bootstrap

Developer Backend Tools | Databases | Cloud Domains

Azure SQL, MongoDB, MySQL, Node.js, npm

Data Analytics

Power BI, Army Gabriel Nimbus Superset

Linux Platforms/Windows/macOS Proficiency

Parrot OS, Kali, Mint Cinnamon, Ubuntu 22.04 LTS, Ubuntu, Windows 10/11, Montery/Ventura

Other Tools

Gitlab, Git Bash, Postman, SharePoint, Microsoft Power Apps & Power Automate, WordPress

Virtualization

Azure VMs, Azure Virtual Desktop (AVD), AWS EC2, Vmware Workstation Pro v.17, Oracle VM VirtualBox, Citrix


PROGRAMMING LANGUAGES

High-level/Scripting

  • SQL
  • JavaScript
  • Python
  • PowerShell
  • Low-Level

  • C/C++ (Familiar)
  • QUERYING/RULE FILTERING LANGUAGES

  • Kibana Query Language
  • Elasticsearch Query Language (ES|QL)
  • Query DSL - Used for adjusting filters within Kibana Dashboard
  • Kusto Query Language
  • Menlo Query Language
  • SPL
  • YARA
  • YAML
  • M Query
  • DAX

  • EDUCATION | CERTIFICATIONS

    BACHELOR OF SCIENCE IN BIOLOGY | 2013 - 2015

    University of Nevada Reno


    FULL STACK WEB DEVELOPMENT | MERN (MongoDB, Express, React.js, Node.js) | 2019

    University of Washington

    13Cubed | Investigating Windows Memory | 2025 (No Expiration)

    Credential Verification

    13Cubed | Investigating Windows Endpoints | 2025 (No Expiration)

    Credential Verification

    CompTIA Security Analytics Expert - CSAE Stackable | 2024 - 2030

    Credential Verification

    CompTIA Advanced Security Practitioner (SecurityX) Certification | 2024 - 2030

    Credential Verification

    CompTIA Security Analytics Professional - CSAP Stackable | 2023 - 2030

    2023 - 2029

    Credential Verification

    CompTIA CySA+ | 2023 - 2030

    Credential Verification

    CompTIA Security+ | 2023 - 2029

    Credential Verification

    AWS Certified Cloud Practitioner | 2023- 2028

    Credential Verification

    Microsoft Azure Fundamentals | 2022 (No Expiration)

    Credential Verification

    WORK EXPERIENCE

    Response Analyst

    Department of War (DOW) | March 2025 - Present


    • Cyber Threat Analysis & Intelligence Fusion
      Led in-depth investigations of cyber threats using SIEM, endpoint security, IDS/IPS, and open-source intel. Correlated threat indicators with APT activity to enhance detection and response efforts.
    • Threat Content Development & Reporting
      Developed and distributed actionable cyber intelligence reports and alerts based on vendor data, internal threat hunts, and higher-echelon guidance, ensuring timely situational awareness.
    • Vulnerability & Risk Management
      Performed comprehensive assessments of IAVA/CVE vulnerabilities, delivering detailed risk evaluations and mitigation strategies to strengthen enterprise cyber resilience.
    • Technical & Forensic Investigation
      Conducted advanced traffic analysis, malware examination, and host log reviews to uncover hidden threats. Documented findings and created repeatable detection methodologies.
    • Cross-Functional Collaboration & AwarenessEngaged with stakeholders to deliver threat briefings and coordinate Information Operations (IO), driving a proactive cybersecurity posture across mission-critical environments.

    IT Specialist (Network)

    DOW | August 2024 - March 2025


    • Research technical feasibility and applicability of networked technologies to optimize performance of cyber operations.
    • Provide technical expertise to conduct infrastructure operations and integrated capabilities for the cyberspace Joint Common Access Platform (JCAP) supporting US Indo-Pacific Command (INDOPACOM) and assigned Cyber Mission Forces (CMF).
    • Test and maintain network infrastructure including software and hardware devices.
    • Create analytic products to assess network requirements, including network architecture, infrastructure and configuration.
    • Prepare and deliver briefings to command leaders, external program managers, and DoD senior officials.

    IT Cybersecurity Specialist (INFOSEC)

    DOW | February 2024 - August 2024

    • Develop policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data
    • Furnishes technical advice, guidance and assistance to the Defensive Cyber Operations Branch Chief, other staff officers, divisions and other agencies on matters pertaining to computer and network security
    • Participates in technical exchanges with a wide variety of DoD organizations, commercial contractors, and other individuals in the development and assessment where incidents require crisis planning and action
    • Provides technical assistance in the assessment of INFOSEC incidents and key vulnerabilities affecting programs such as INDOPACOM
    • Create, review, and deploy signatures based on the SNORT, Suricata, and Yara rule detection sets

    Security Analyst

    State of Hawaii | 2023 - 2024

    • Review and update department technology policies. Ensure policies comply with applicable department, state, and federal/IRS information system requirements
    • Monitor, evaluate, and remediate security vulnerabilities while sustaining department business operations
    • Monitory and review security activities, application logs, and reported security incidents. Report security findings in a timely manner to IT supervisors
    • Assist and manage application security roles, performing department user re-validations and addressing access or permissions issues.
    • Create, configure, and maintain databases required for department applications
    • Setup and manage external application interfaces, including SFTP and API connections
    • Setup and manage application security settings and user roles (RBAC)
    • Support the installation, configuration, and management of the document capture software and hardware.

    Microsoft Software Development Engineer

    DOW | 2020 - 2022

    • Build customize applications that is deployed within DoD Environment
    • Utilize Excel and BI Models
    • Build sophisticated and user-friendly Excel templates from modeling
    • Write PowerFx, JSON code to automate tasks within assigned projects
    • Salvage problematic workbooks
    • Enable Spreadsheet models to communicate with database applications
    • Develop Microsoft Applications for better UI via PowerApps
    • Program fillable forms and developer paperless workflow efforts

    PROJECTS:

  • Cisco ASA Vulnerability Research and Assessment
  • FIREANT Threat Assessment and Correlation to VMWare and vCenter vulnerabilities
  • Lumma Stealer C2 Analysis
  • NATO Exercise: Locked Shields 2024 - Fusion/Security & Threat Hunt Member for Blue Team 18 - Australia & Greece
  • Implement and revise Policies and Procedures at State of Hawaii Department of Taxation using NIST 800-53r.5 and Publication 1075 Policies
  • Hawaii Zoning Atlas
  • Encryptor-Decryptor Application
  • php-reverse-shell