🟢 Open to Work — Cybersecurity & Cloud Security Roles · Hampton Roads / Remote · Active Secret ClearanceAvailable immediately
🔐 Active Secret Clearance — DoD / IC Eligible
Open to Cybersecurity & Cloud Roles · Hampton Roads / Remote

Johnson
Vincent

Cybersecurity Professional · U.S. Navy Veteran · CompTIA Security+ (IAT Level II)

I protect systems, detect threats, and build real-world security solutions. With 9 years of U.S. Navy service and active hands-on engineering work, I bring mission-critical discipline to every environment I defend.

$ _
Active Secret Clearance Security+ IAT Level II 9 Yrs U.S. Navy BS Cybersecurity May 2026 Chesapeake / Norfolk VA

Currently studying: AWS Cloud Practitioner (CLF-C02) · Target: July 2025

9+Years U.S. Navy
5Security Projects
IAT IIDoD 8570 Compliant
SECRETActive Clearance
Technical Stack

What I work with

Tools and technologies across cybersecurity, cloud, networking, and scripting — all relevant to SOC and cloud security roles.

CompTIA Security+ (IAT II) Wazuh SIEM Wireshark Nmap AWS (EC2 · S3 · IAM) Linux / Kali Linux Python 3 Bash Scripting Windows Server GitHub / Git Threat Detection Incident Response NIST CSF / 800-53 TCP/IP · DNS · DHCP · ARP Vulnerability Assessment Log Analysis VirtualBox / VMware DoD 8570 IAT Level II
Currently Building

Home SOC Lab

Building a real Security Operations Center from scratch — simulating real attacks, detecting them with Wazuh SIEM, and documenting every step as a GitHub portfolio project.

LIVE BUILD

Wazuh SIEM Environment — In Progress

Stack: Kali Linux (attacker) · Ubuntu 22.04 + Wazuh 4.x (SIEM) · Windows Server 2022 (target) · Wireshark (analysis)

PHASE 1 — INFRASTRUCTURE
1

Install VirtualBox + Ubuntu 22.04

Wazuh server base environment

2

Deploy Wazuh SIEM + Dashboard

Central logging, alerting, visualization

3

Connect Kali Linux as attacker VM

Red team node for attack simulations

4

Add Windows Server as endpoint

Wazuh agent + Windows event collection

PHASE 2 — ATTACK & DETECT
5

Run Nmap scan — watch alerts fire

Network reconnaissance detection

6

Simulate SSH brute force attack

5+ failed logins in 60 sec

7

Triage alerts in Wazuh dashboard

Full SOC analyst workflow

8

Document + publish to GitHub

Screenshots · IR writeup · timeline

💡 Why this matters: Most candidates applying to SOC roles at ManTech, Leidos, and CACI have zero hands-on SIEM experience. A documented Wazuh home lab puts me in the top tier of applicants and demonstrates real threat detection capability before day one.
Featured Projects

Python Security Tools

Real security tools demonstrating threat detection, network analysis, integrity verification, and authentication hardening — all directly relevant to SOC analyst and cybersecurity engineer workflows.

SOC · Threat Detection

Log Analyzer

Parses Linux auth logs to detect brute force attempts — flags 5+ failed SSH logins within 60 seconds, outputs structured threat reports with source IPs, timestamps, and severity scoring.

PythonRegexBrute Force DetectionSOC Relevant
GitHub →
Networking · Recon

Basic Port Scanner

Python socket-based scanner that identifies open TCP ports, maps services to common port numbers, and flags potentially vulnerable entry points — mimics core Nmap recon methodology.

PythonSocketsNmap ConceptsNetwork Recon
GitHub →
Integrity · Forensics

File Hash Verifier

Generates MD5, SHA-1, and SHA-256 hashes and compares against known-good values to detect tampering — core skill for malware triage, chain-of-custody verification, and digital forensics.

PythonHashingMalware AnalysisForensics
GitHub →
Threat Intel · Phishing

URL Scanner

Checks URLs against suspicious pattern signatures — detects IP-based addresses, encoded payloads, and known phishing indicators. Supports SOC analyst triage of reported phishing emails.

PythonURL AnalysisPhishing DetectionThreat Intel
GitHub →
Auth Security · NIST

Password Strength Checker

Evaluates password strength using NIST SP 800-63B guidelines — checks length entropy, character variety, and common patterns. Demonstrates security awareness tooling and policy enforcement.

PythonNIST 800-63BAuthenticationInput Validation
GitHub →
Coming Soon

Wazuh SOC Lab Docs

Full home SOC environment documentation — Wazuh SIEM detecting real Kali Linux attacks, with screenshots, alert analysis, and step-by-step incident response writeups.

WazuhSIEMSOC OperationsLinux
View GitHub →
Certifications

Cert Roadmap

Structured progression from DoD 8570 compliance through full cloud security expertise.

CompTIA Security+ (SY0-701)
Completed · DoD 8570 IAT Level II · Active
COMPLETE
📚
AWS Cloud Practitioner (CLF-C02)
In Progress · Target: July 2025
STUDYING
🎯
CompTIA CySA+
Planned · Target: Oct 2025
NEXT UP
☁️
AWS Solutions Architect Associate
Planned · Target: Dec 2025
PLANNED
🔐
CEH — Certified Ethical Hacker
Planned · Target: Q1 2026
PLANNED
Skill Levels
Network Security75%
Linux Administration65%
Python Security Scripting60%
Wireshark / Packet Analysis55%
Threat Detection / SIEM50%
AWS Cloud40%
Career Target

Target Employers

Focused on DoD contractor roles in Hampton Roads — where Active Secret Clearance is a primary requirement and veteran status is a direct advantage.

ManTech
DoD Contractor · Norfolk Area
SOC Analyst
Leidos
DoD Contractor · Remote/Norfolk
Cyber Analyst
CACI
Clearance Required
Cloud Security
SAIC
Hampton Roads · Veteran Hiring
Cyber Engineer
🎖 My hiring advantage: Active Secret Clearance eliminates the 6–18 month clearance wait. DoD 8570 IAT Level II compliant. Veteran hiring preferences apply at all four companies. Available to start immediately.
About Me

Mission-driven security engineering.

Nine years of Navy service built the operational foundation. Now I'm engineering the technical future.

Professional Summary

I am a U.S. Navy veteran with an Active Secret Clearance transitioning into cybersecurity and cloud security engineering. With 9 years of military service in systems administration, database management, and operational security, I bring mission-critical discipline and accountability to every technical challenge.

Currently completing my BS in Cybersecurity at ECPI University (May 2026) while building a home SOC environment, earning cloud certifications, and targeting SOC Analyst and Cloud Security roles with DoD contractors throughout Hampton Roads and remotely.

Python · Wazuh · Nmap · Wireshark · Linux · AWS · Bash · Git · VS Code
Key Advantages
🔐 Active Secret Clearance
Eliminates 6–18 month clearance wait. Immediately deployable on DoD contracts.
🎖 9 Years Military Discipline
Navy-trained: operational security mindset, works under pressure, follows protocol.
🛠 Active Builder — Not Just a Student
5 live GitHub projects + home SOC lab in active development.
📍 Hampton Roads Local
Based in Chesapeake — ideal for Norfolk/VB DoD contractor roles.
Why Me

Three things that set me apart.

01
Clearance + Veteran

No onboarding delay

Active Secret Clearance + DoD 8570 IAT Level II means immediate contract placement. No 6–18 month wait. That's a measurable cost saving for any DoD contractor.

02
Hands-On Evidence

I build, not just study

Five public Python security tools, a Wazuh SOC home lab in active development, and consistent GitHub commits. I practice cybersecurity in real lab environments every day.

03
Military Execution

Mission over everything

Nine years in the Navy built accountability, operational security instincts, and the ability to perform under pressure — all of which transfer directly to incident response and SOC operations.

Contact

Let's work together.

Reach out for cybersecurity and cloud security opportunities, technical collaborations, or conversations. Based in Chesapeake / Hampton Roads — open to remote roles nationwide.

✅ Message sent! I'll respond within 24 hours.
✉ Email Directly LinkedIn GitHub
Resume

Download My Resume

DoD-optimized PDF — clearance status, IAT Level II, military experience, certifications, and project work.

Download PDF ↓
Formatted for DoD ATS. Highlights clearance, IAT Level II compliance, and hands-on technical experience.
Quick Contact