Security analyst and systems administrator with a track record across incident response, SIEM engineering, SOC2 Type II compliance, and emerging AI governance. I build automation-first security programs that reduce noise, accelerate response, and hold up to auditors.
Identifies shadow AI via OAuth inventory and DNS analysis — classifying tools across seven security risk factors including data retention, compliance certifications, and encryption standards — generating risk scores with Approved / Conditional / Prohibited classification.
Maps findings to ISO 42001 and OWASP LLM Top 10 with automated PDF report generation. Addresses the AI governance gap that enterprise tools solve at six-figure cost, with no accessible mid-market alternative.
150+ Wazuh SIEM API functions covering user management, agent inventory, and security statistics — reducing SOC automation development time significantly. Built to fill a gap in the Wazuh ecosystem for teams who need programmatic control without hand-rolling API wrappers.
Competency-based program spanning network security, digital forensics, ethical hacking, risk management, and security architecture — completed in parallel with full-time security roles and aligned to industry certifications.
Open to full-time security engineering and architecture roles, SOC leadership positions, and consulting engagements. Especially interested in teams serious about detection engineering, AI governance, or SOC2 / ISO compliance programs.
Send a Message