Snapshot
I am currently an IT specialist looking for a transition into the cybersecurity industry.
- Core skills: SIEM, DFIR, alert triage, threat hunting.
- Tools: Splunk/Wazuh, Suricata, Flare, Remnux.
- Certs: Security+, CYSA+
- Clearance: Secret
Security • Engineering • Research
I build defensive systems, break things responsibly, and document what I learn. Explore my homelab, CTF work, and projects.
I am currently an IT specialist looking for a transition into the cybersecurity industry.
SOC, Incident response, Security analyst, Threat hunter, Threat researcher.
Detect
Write detections and alerts with clear logic and low noise.
Hunt
Turn hypotheses into queries and validate with evidence.
Harden
Secure configs, baselines, and infrastructure patterns.
My homelab is built as a hands-on cybersecurity playground where I can safely test, break, and learn. I run Proxmox as my virtualization platform to spin up and manage multiple isolated VMs efficiently, which lets me recreate real-world environments on demand. At the network edge I use IPFire as my firewall to segment traffic and keep lab activity contained, while still giving me control over routing and access policies. Inside the lab, I maintain dedicated forensics and malware analysis machines for investigating suspicious files and practicing analysis workflows in a controlled setting. I also host an Active Directory environment to experiment with authentication, domain administration, and common attack paths—giving me a realistic space to practice techniques, validate defenses, and improve my understanding of enterprise security. I also run a few other servers that run my detection and monitoring systems such as Wazuh being my SIEM to centralize logs from all of these different sources into one place where I can practice my threat hunting operations and detection rules. All of this is running off of 6 dell optiplexes and a ProtectCLI device to run IPFIRE as a router/firewall solution.
Suricata + dashboards integrated with IPFire for traffic analysis and alerting.
Both Flare and Remnux used for malware analysis and reverse engineering.
Aggregate logs, normalize, and build detections with saved searches used in Wazuh or Splunk.
CTF Name Here
Blue Team CTF - Defcon
CTF Name Here