Threat Intelligence Platform Management: Anomali Threatstream, Anomali Integrator, Recorded Future
SIEM Tools: Splunk, Elastic
Endpoint Protection: Microsoft Defender, SentinelOne
Scripting Languages: Bash, Python
Threat Hunting Rule Languages: YARA, Sigma
AI Applications: Adept at harnessing AI for threat detection, hunting, and response.
GIAC Cyber Threat Intelligence (Analyst ID: 208173)
Recorded Future Certified Analyst
H-ISAC TIC Member: Collaborate with healthcare sector professionals in the H-ISAC threat intelligence circle to address and respond to physical and cybersecurity threats.
FS-ISAC Member: Engage with financial sector peers to share threat intelligence and best practices, enhancing sector-wide cybersecurity posture.
GIAC Advisory Board Member: Provide insights and feedback on GIAC certification exams and initiatives, ensuring they stay aligned with industry needs and trends.
Spearhead the Cyber Threat Intelligence program's design and implementation, employing industry standards like MITRE ATT&CK, Lockheed Martin Cyber Killchain, and the Diamond Model.
Founded and define the company's threat-hunting program, in line with TaHITI and MaGMa frameworks.
Direct threat hunting and adversary tracking efforts; author intelligence reports for varied stakeholders.
Determine priority intelligence requirements for internal consumers.
Guide Level 1 analysts during escalations and incident response.
Cultivated and upheld 100 intelligence alerts in Recorded Future, drawing on its insights for detection creation.
Steered the management of 500+ monthly alerts across platforms including Microsoft Azure AD, Microsoft Cloud App Security, and SentinelOne.
Orchestrated the integration of indicators of compromise to formulate threat models and lay down detections.
Administered the JAMF macOS environment, championed weekly patching, and facilitated user software access.
Piloted scripting endeavors for macOS CIS 10.15 Standard Hardening.
Played a pivotal role in high-stakes projects: JAMF's corporate implementation, mobile access orchestration, and O365 tenant mergers.
Diligently resolved and cataloged technical issues, strictly observing the service desk SLAs.
Acted as the linchpin for new hire onboarding, overseeing account setups, hardware provisioning, and task quality assurance.