Strategic SOC/Cyber Defense Lead with extensive experience in leading and architecting proactive security operations, bridging the gap between Cyber Threat Intelligence (CTI), threat detection engineering, and incident response. Expert in establishing and managing MSOC/Resident SOC teams, building end-to-end detection pipelines mapped to MITRE ATT&CK, and driving an intelligence-led defense strategy. Proven track record in designing, integrating, and optimizing core security solutions (SIEM, SOAR, EDR, TIPs, DRP), developing custom automation and tooling (Python, N8N, "ThreatOps"), and applying DFIR/Forensics for deep-dive investigations. A certified professional dedicated to leveraging strategic leadership and deep technical expertise to build a unified, adaptive, and highly effective cyber defense capability.
"You need to understand what you are protecting"
- Cyber Defense Center - Strategic planning and operations
- Cyber Defense Intelligence - Intelligence-driven defense strategies
- SOC - Security Operations Center management and operations
- DFIR - Digital Forensics and Incident Response
- Cyber Threat Hunting (CTH) - Proactive threat detection and hunting
- Cyber Threat Intelligence (CTI) - Threat intelligence collection, analysis, and operationalization
- Standard Operating Procedure (SOP) - Process development and documentation
- Playbook - Incident response and security playbook development
- Compromise Assessment - Advanced threat detection and eradication
- SOC Assessment - Security operations maturity evaluation
- Threat-Informed Defense - Intelligence-led security strategy
- Advanced Compromise Assessment - Deep-dive threat detection and eradication techniques
- Threat Hunting - Advanced hunting methodologies and techniques
- Forensics - Digital forensics and investigation capabilities
- π€ Automated CTI Pipeline: Built comprehensive automated CTI pipeline using MISP, N8n, and Python.
- πΊοΈ MISP Galaxy: Designed and published a custom MISP Galaxy mapping ransomware actors to ATT&CK.
- π n8n Workflows: Built end-to-end enrichment pipelines for MISP events.
- π MISP Analytics: Created interactive Jupyter Notebook dashboards for threat visualization.
- βοΈ Attack Simulation: Utilized CALDERA for adversary emulation and defense testing.
- π eCTHPv2 β eLearn Security Certified Threat Hunting Professional
- π Threat Intelligence Analyst β Group-IB
- π Cyber Investigator β Group-IB
- π Belkasoft Windows Forensics
- π Certified Cybersecurity Educator Professional (CCEP)
- π Certified Threat Hunting and Incident Response I (CTHIRI)
- π MITRE ATT&CK Fundamentals Certification
- π MITRE ATT&CK Security Operations Center Assessment
- π MITRE ATT&CK Cyber Threat Intelligence
- π MITRE ATT&CK Adversary Emulation Methodology
- π MITRE ATT&CK Threat Hunting and Detection Engineering
- π MITRE ATT&CK Purple Teaming Methodology
- ThreatOps: Custom CTI Automation Platform - Custom-built tool for RSS feed intelligence collection and operationalization
- MISP: Malware Information Sharing Platform - Advanced CTI pipeline and automation workflows
- TheHive: Open Source SOAR - Incident response and threat handling automation
- Threat Hunting Framework - MITRE ATT&CK-based hunting methodologies and detection engineering
- EDR Assessment Guide - Comprehensive evaluation framework for endpoint detection solutions
- CTI Pipeline Automation - End-to-end automated threat intelligence processing and enrichment
- ELK Stack Deployment - Security-focused log analysis and visualization
- C2 Framework Integrations - Purple team testing and detection validation
- Attack Simulation Labs - Controlled environments for threat emulation and hunting
- API-to-QRadar Syslog Middleware - Custom integration solutions
- WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
- China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
- ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
- The State of Trusted Open Source
- Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release


