Skip to main content

Security Engineer (Entry Level)

I build pragmatic detection workflows and ethical OSINT investigations that turn data into verifiable outcomes.

Entry-level security professional with hands-on experience in detection engineering, OSINT research, and security automation. All work is documented and verifiable.

Key Statistics

3

Case Studies Published

See linked projects

1

Public Detection Repo

Verifiable on GitHub

Lab-Validated Work

Reproducible methods

References Available

Upon request

Featured Projects

Real-world security work with measurable outcomes. Each case study includes methodology, findings, and lessons learned.

Detection engineering dashboard visualization

Blue Team Detection Engineering

Problem: High false-positive rates in SIEM alerts. Approach: Tuned detection logic using ATT&CK mapping. Result: Lab-validated rules with documented methodology.

  • Sigma-format detection rules (see GitHub repo)
  • Documented tuning process and test cases
  • ATT&CK technique coverage mapping
OSINT investigation workflow diagram

OSINT Investigation Framework

Problem: Unstructured reconnaissance process. Approach: Built repeatable methodology with ethical guidelines. Result: Documented playbook with sanitized examples.

  • Structured OSINT methodology document
  • Tool chain documentation
  • Ethical boundaries and legal considerations
Security audit findings overview

FiveM Security Audit

Problem: Unknown security posture of gaming infrastructure. Approach: Systematic vulnerability assessment. Result: Findings report with remediation guidance.

  • Vulnerability assessment methodology
  • Secure coding guidelines created
  • Remediation verification process

How I Work

A structured approach to security work that prioritizes accuracy, documentation, and actionable outcomes.

Reconnaissance

Passive OSINT using public sources. Active scanning only with explicit authorization. All findings documented with timestamps.

Analysis

Map findings to ATT&CK framework. Prioritize by exploitability and business impact. Maintain chain of custody for evidence.

Detection

Write Sigma-format rules. Test against benign and malicious samples. Tune thresholds to minimize false positives.

Documentation

Every finding includes reproduction steps. Reports written for technical and executive audiences. Version-controlled artifacts.

Skills & Expertise

Core competencies with specific tooling and techniques. All skills demonstrated in linked case studies.

SIEM & Detection Engineering Detection

Splunk, Sigma rules, alert tuning

Threat Hunting Detection

ATT&CK-based hypothesis hunting

OSINT & Reconnaissance Research

Passive recon, asset discovery

Python Automation Development

Security tooling, log parsing

Log Analysis Analysis

Windows events, network logs

Incident Response Operations

Triage, containment, documentation

Evidence & Validation

Transparent proof of work for hiring managers and technical reviewers.

30s

30-Second Proof

Download a minimal verification package: one Sigma detection rule, one benign test log, and a README explaining how to validate.

Download Proof Package (ZIP)

Verification Tiers

Quick Check (30 seconds)

Download proof package above, open README, verify rule syntax.

3m

Case Study Review

Read any project page for Problem → Approach → Result breakdown.

15m

Technical Deep Dive

Full case study with methodology, code samples, and lessons learned.

Public Repository

Detection rules and security automation scripts.

View on GitHub →

References

Professional references available upon request during interview process.

Get in Touch

Interested in working together? Reach out via email or connect on LinkedIn.