Details
Skills
Security Operations & SOC
SIEM monitoring (Wazuh, Splunk), threat hunting, alert triage, incident response, log analysis (Windows Event Logs, Syslog, firewall logs), IOC analysis, vulnerability scanning, server and endpoint hardening
Infrastructure & Identity
Windows Server administration, Active Directory, Group Policy, Exchange fundamentals, Linux administration (CentOS, Ubuntu), identity and access management (IAM), authentication and access controls
Networking & Network Security
Firewall configuration (Palo Alto), VLANs, VPNs, network segmentation, TCP/IP, traffic analysis (Wireshark), IDS/IPS concepts, secure network architecture
Cloud & Automation
AWS, Azure, VMware vSphere, Hyper-V, cloud security fundamentals, IAM policies, network security groups, logging and monitoring, infrastructure as code (Terraform, Ansible, Bicep), scripting (PowerShell, Bash)
Governance, Risk & Compliance
Risk assessments, threat modeling, vulnerability management lifecycle, remediation tracking and validation, security documentation, familiarity with NIST, ISO 27001, CIS Controls. Clear technical documentation for technical and non-technical stakeholders
Penetration Testing
Network and service enumeration, vulnerability exploitation, web application security testing (OWASP Top 10), Linux and Windows privilege escalation, credential-based attacks, lateral movement, offensive security tools (Kali Linux, Metasploit, Burp Suite), MITRE ATT&CK mapping and reporting
About
Cybersecurity and infrastructure specialist with hands-on experience securing Windows and Linux environments, deploying PKI-based systems, and operating security controls across on-prem and cloud platforms. Proven ability to harden servers, investigate security events, implement network segmentation, and document technical findings for operational and non-technical stakeholders. Solid foundation in systems administration, SOC operations, and applied cryptography, with a practical, build-and-secure mindset.