I protect systems, detect threats, and build real-world security solutions. With 9 years of U.S. Navy service and active hands-on engineering work, I bring mission-critical discipline to every environment I defend.
Tools and technologies across cybersecurity, cloud, networking, and scripting — all relevant to SOC and cloud security roles.
Building a real Security Operations Center from scratch — simulating real attacks, detecting them with Wazuh SIEM, and documenting every step as a GitHub portfolio project.
Wazuh server base environment
Central logging, alerting, visualization
Red team node for attack simulations
Wazuh agent + Windows event collection
Network reconnaissance detection
5+ failed logins in 60 sec
Full SOC analyst workflow
Screenshots · IR writeup · timeline
Real security tools demonstrating threat detection, network analysis, integrity verification, and authentication hardening — all directly relevant to SOC analyst and cybersecurity engineer workflows.
Parses Linux auth logs to detect brute force attempts — flags 5+ failed SSH logins within 60 seconds, outputs structured threat reports with source IPs, timestamps, and severity scoring.
Python socket-based scanner that identifies open TCP ports, maps services to common port numbers, and flags potentially vulnerable entry points — mimics core Nmap recon methodology.
Generates MD5, SHA-1, and SHA-256 hashes and compares against known-good values to detect tampering — core skill for malware triage, chain-of-custody verification, and digital forensics.
Checks URLs against suspicious pattern signatures — detects IP-based addresses, encoded payloads, and known phishing indicators. Supports SOC analyst triage of reported phishing emails.
Evaluates password strength using NIST SP 800-63B guidelines — checks length entropy, character variety, and common patterns. Demonstrates security awareness tooling and policy enforcement.
Full home SOC environment documentation — Wazuh SIEM detecting real Kali Linux attacks, with screenshots, alert analysis, and step-by-step incident response writeups.
Structured progression from DoD 8570 compliance through full cloud security expertise.
Focused on DoD contractor roles in Hampton Roads — where Active Secret Clearance is a primary requirement and veteran status is a direct advantage.
Nine years of Navy service built the operational foundation. Now I'm engineering the technical future.
I am a U.S. Navy veteran with an Active Secret Clearance transitioning into cybersecurity and cloud security engineering. With 9 years of military service in systems administration, database management, and operational security, I bring mission-critical discipline and accountability to every technical challenge.
Currently completing my BS in Cybersecurity at ECPI University (May 2026) while building a home SOC environment, earning cloud certifications, and targeting SOC Analyst and Cloud Security roles with DoD contractors throughout Hampton Roads and remotely.
Active Secret Clearance + DoD 8570 IAT Level II means immediate contract placement. No 6–18 month wait. That's a measurable cost saving for any DoD contractor.
Five public Python security tools, a Wazuh SOC home lab in active development, and consistent GitHub commits. I practice cybersecurity in real lab environments every day.
Nine years in the Navy built accountability, operational security instincts, and the ability to perform under pressure — all of which transfer directly to incident response and SOC operations.
Reach out for cybersecurity and cloud security opportunities, technical collaborations, or conversations. Based in Chesapeake / Hampton Roads — open to remote roles nationwide.
DoD-optimized PDF — clearance status, IAT Level II, military experience, certifications, and project work.
Download PDF ↓