Start Here
Not sure where to begin? Pick your path โ each route shows the most relevant artifacts for your context.
For Recruiters
Quick overview of skills, targets, and proof points
For Hiring Managers
Technical depth โ methodology, detection logic, and architecture
Recommended reading order
For Small Teams
Advisory scope, services overview, and how to engage
Where I can help
- Threat Hunt Program โ Build a repeatable, low-friction hunt cycle for a small SOC
- Cloud Security Review โ AWS posture, IAM, CloudTrail/GuardDuty baseline
- Detection Engineering โ SIEM rule development, Sigma content, alert tuning
- NIST / RMF Mapping โ Control gap analysis and documentation support
Engagements are scoped, time-boxed, and NDA-ready. No production access required unless agreed. Recommendations + documentation only.
Hunt Reports
MITRE-aligned, documented, detection output included
Projects
Labs + architecture case studies with outcomes
Guides
Checklists and short-form practitioner references
Frameworks
NIST, RMF, and control mapping notes