40% MTTR reduction
Python-automated alert validation cut incident response time at Sound Transit's 24/7 enterprise SOC.
Cybersecurity Analyst · Security Operations · Incident Response
5+ years in enterprise SOC environments — Splunk-driven threat detection, Python-automated alert validation, and incident response workflows built to NIST 800-53 and CJIS standards.
Python-automated alert validation cut incident response time at Sound Transit's 24/7 enterprise SOC.
150+ SOC incidents resolved per month across Splunk, SolarWinds, and Blackrock3 — 99.9% uptime sustained.
CJIS Level 4 cleared. Enterprise transit, DoD, and law enforcement environments.
Experience
Enterprise SOC operations, DoD compliance, law enforcement IT, and infrastructure auditing.
Led SOC workflows in a 24/7 enterprise environment across 3,000+ endpoints. Automated alert validation with Python — drove a 40% reduction in MTTR and enabled NIST 800-53 compliance. Resolved 150+ incidents/month via Splunk, SolarWinds, and Blackrock3 at 99.9% uptime. Overhauled ServiceNow workflows and built SOPs that cut analyst onboarding time by 25%.
Rebuilt DoD security environments for 500+ users. Managed DISA STIG-compliant Windows 10 deployment — 25% reduction in unauthorized access. Developed Splunk SIEM threat hunting protocols and vulnerability management strategies that delivered a 35% stronger security posture.
Secured hybrid operations for academic and law enforcement teams during COVID-19 continuity response. Enabled CJIS-compliant endpoint security for 200+ users, redesigned SolarWinds data flows for a 20% SOC efficiency gain, and built IR playbooks for cross-team knowledge transfer.
Coordinated infrastructure audits across 20+ Amazon buildings — AV systems, Cisco hardware, and projector infrastructure. Streamlined asset inventory documentation and developed improved tracking processes that shortened audit cycles and improved equipment accuracy across campuses.
Lab / Build
Applied security engineering, private AI infrastructure, and operational discipline — running in production.
Multi-node Proxmox cluster running isolated LXC services: private DNS via AdGuard, AI inference routing via Ollama and OpenClaw, Syncthing vault backup, and a LiteLLM proxy. Full change log, runbooks, and review-first deployment gates throughout.
Auth-protected TypeScript/Express dashboard for real-time node health — live CPU/memory arc gauges, section status badges, auto-refresh every 30s, and an activity timeline. Driven by live shell collectors running on a cron cycle.
Skills
Enterprise security tooling, scripting, compliance frameworks, and infrastructure — applied in real environments.
Certifications
Industry certifications and clearances earned through applied security work.
Education
Formal cybersecurity and forensics training alongside applied professional experience.
Competency-based program covering security operations, cryptography, network defense, risk management, and governance.
Foundation in digital forensics, network security, incident response methodology, and applied security analysis.
Connect
Actively seeking cybersecurity analyst, SOC, and incident response roles. If you value measured outcomes, documented processes, and someone who's done this work in real enterprise environments — let's talk.