Digital Forensics | Insider Risk | Threat Detection Specialist
Digital Forensics and Insider Risk Investigation specialist with extensive experience in cybersecurity monitoring, threat detection, and incident response. Proven track record of developing sophisticated detection rules and security monitoring solutions.
Previously served as an Insider Risk Investigator T2 at DTEX Systems, where I managed 10+ client accounts, conducted advanced threat hunting using UEBA/SIEM tools, and pioneered Linux detection capabilities. Developed over 100 custom detection rules for enterprise security operations.
Currently focused on building comprehensive EDR platforms, creating realistic threat simulation environments, and developing production-ready security monitoring systems with real-time alerting capabilities.
DTEX Systems
Previous Role
Hudson Valley Community College
Previous Role
Various Organizations
Previous Role
Comprehensive endpoint detection and response system with real-time alerting, custom detection rules, and enhanced dashboard with regex pattern support and keyword exclusion capabilities.
Enterprise-grade SIEM deployment for comprehensive security monitoring with custom detection rules for insider threat scenarios, data exfiltration attempts, and sensitive document access monitoring.
Custom Windows event collection agent that captures Sysmon events and forwards them to Flask web applications with real-time dashboards and sequence analysis for threat hunting.
Realistic financial institution environment for testing detection capabilities, including insider threat scenarios with realistic artifact placement for digital forensics training and threat detection validation.
Production-ready network monitoring system with automated alert generation and manual correlation detection. Integrated across WiFi networks for comprehensive traffic analysis.
Automated forensic artifact collection tools for Windows environments, including memory dump analysis utilities and credential file search tools for professional investigations.
Library of custom SIGMA rules for detecting advanced persistent threats, lateral movement, and data exfiltration across diverse security platforms.
Forensic tool for extracting and analyzing Chrome browser artifacts including history, credentials, and cached data for incident response investigations.
Bachelor of Science in Digital Forensics
Graduated
Certified
Framework Knowledge