%20255--7315-orange?style=for-the-badge&logo=phone&logoColor=white)
</div>
π¨βπ» About Me
Iβm a Certified SOC Operations Analyst and IT Support Professional with CompTIA Security+ certification and a Masterβs in Cybersecurity Technology. Currently working in IT operations at Towson University, I specialize in incident response, threat detection, systems administration, and technical support.
π― Currently seeking: IT Support Specialist and SOC Analyst roles where I can leverage my technical skills, security certifications, and customer service excellence.
What I Bring:
β
IAT Level II Compliant - Ready for government/defense sector roles
β
Hands-on SOC Experience - 48-hour intensive training with live cyber range simulation
β
Real-world IT Support - 2,000+ tickets processed, IT asset management, technical troubleshooting
β
Strong Technical Foundation - Windows/Linux/macOS administration, networking, SIEM platforms
β
Security-First Mindset - Threat detection, incident response, vulnerability management
π‘οΈ Certifications & Credentials
<div align="center">
Certification |
Status |
Year |
π CompTIA Security+ |
β
Active |
Current |
π― BCR Cyber SOC Operations Analyst I |
β
Certified |
2025 |
π
IAT Level II Compliant |
β
Compliant |
Current |
π M.S. Cybersecurity Technology |
β
Graduated |
Presidentβs List |
</div>
πΌ Technical Skills
π Cybersecurity & SOC Operations
SOC Operations | Incident Response | Threat Detection | Threat Hunting
SIEM (Splunk) | Log Analysis | Alert Triage | Security Monitoring
Wireshark | Zeek | tcpdump | Snort | IDS/IPS | EDR Platforms
MITRE ATT&CK | NIST Framework | RMF | Vulnerability Mgmt
Penetration Testing | Digital Forensics | Malware Analysis | IAM
π» IT Support & Systems Administration
Operating Systems | Windows 10/11 | Windows Server | Linux (Ubuntu, Kali, CentOS) | macOS
Networking | TCP/IP | DNS | DHCP | VLANs | Firewall Configuration
Virtualization | VMware Workstation | VirtualBox | Virtual Machine Management
Service Desk | Ticketing Systems | Technical Documentation | IT Asset Management
Hardware Support | Desktop/Laptop Support | Peripheral Configuration | IT Equipment Lifecycle
Troubleshooting | System Diagnostics | Network Troubleshooting | Remote Support
Command Line | PowerShell | Bash | Linux CLI (grep, awk, netstat, sed)
Security Tools | Metasploit | Nmap | Burp Suite | John the Ripper
Monitoring | SIEM Dashboards | Network Traffic Analysis | Log Aggregation
Productivity | Excel | Power BI | Microsoft Office Suite
π Programming & Scripting
# Languages & Scripting
Python | PowerShell | Bash
π Education
π Master of Science in Cybersecurity Technology
University of Maryland Global Campus - Adelphi, Maryland
π Presidentβs List
π Bachelor of Arts in Psychology
Lehigh University - Bethlehem, Pennsylvania
π¬ Featured Projects & Training
π― BCR Cyber SOC Operations Analyst I Training
BCR Cyber Workforce Accelerator - SOC Series 3000 Cyber Range | Completed: 2025
48-Hour Intensive Program (40 hrs async + 8 hrs live cyber range)
- π¨ Live Cyber Range Simulation: Responded to real-time cyberattacks across multiple network segments
- π Threat Detection: Used Wireshark, Zeek, and Linux CLI to identify lateral movement and data exfiltration
- π SIEM Operations: Operated in simulated SIEM environment for alert triage and incident escalation
- πΊοΈ MITRE ATT&CK: Applied framework to map adversary TTPs during live threat scenarios
- π‘οΈ Incident Response: Executed playbooks for malware infections, privilege escalation, unauthorized access
- π Threat Hunting: Collaborated in team-based log analysis and post-incident reporting
- π― EDR Proficiency: Demonstrated endpoint detection and response workflows
- β
Certified: Passed 100-question certification exam
Key Tools Used: Linux CLI (grep, awk, netstat, tcpdump), Wireshark, Zeek, SIEM, EDR, Firewall analysis
πΌ Deloitte Australia Cyber Job Simulation - Forage
Completed: July 2025
- π Log Analysis: Analyzed web activity logs using Wireshark, Splunk, and Linux CLI
- π¨ Breach Investigation: Investigated simulated cybersecurity breach and provided remediation recommendations
- π Network Forensics: Applied security event correlation techniques
- π Technical Communication: Documented findings and communicated with stakeholders
Key Tools Used: Wireshark, Splunk, Linux CLI (grep, awk)
π³ Mastercard Cybersecurity Virtual Experience - Forage
Completed: October 2024
- π£ Phishing Detection: Identified and reported phishing threats using SIEM dashboards
- π Data Analysis: Used Excel and Power BI to visualize and interpret threat data
- π― Security Awareness: Conducted gap analysis and designed tailored training campaigns
- π Stakeholder Presentations: Presented security insights demonstrating data storytelling
Key Tools Used: Excel, Power BI, SIEM Dashboards
π CST 630 - Advanced Cyber Mitigation & Exploitation Methodologies
University of Maryland Global Campus | Completed: April 2024
Graduate-Level Offensive & Defensive Cybersecurity Course
- π Penetration Testing: Used Kali Linux tools (Metasploit, Nmap, Burp Suite, John the Ripper)
- π Web Application Security: Performed SQL injection, XSS, and authentication bypass assessments
- π₯οΈ System Hardening: Built and secured virtual machines with multi-tier network architectures
- π― Threat Modeling: Applied risk analysis methodologies to evaluate attack surfaces
- π Network Analysis: Used Wireshark, tcpdump, and Snort for packet inspection and IDS
- π Technical Writing: Authored penetration test reports and incident response plans
- π‘οΈ Red Team/Blue Team: Collaborated in simulated exercises implementing layered defenses
Key Tools Used: Kali Linux, Metasploit, Nmap, Burp Suite, Wireshark, tcpdump, Snort, VMware
πΌ Professional Experience
π₯οΈ Moving and Storage Specialist - IT Operations
Towson University | Towson, MD | April 2023 - Present
IT Support & Technical Operations:
- π« Provide technical customer service for 2,000+ service tickets supporting students, faculty, and staff
- π» Manage secure handling, inventory, and disposal of thousands of computers, monitors, and IT equipment
- π§ Troubleshoot technical issues and coordinate with IT department for escalated support
- π Document and track IT equipment through complete lifecycle management
- β
Maintain 100% safety compliance with zero incidents over 2 years
Key Achievements:
- β
2,000+ service requests completed with high satisfaction ratings
- β
Zero safety incidents maintaining OSHA compliance
- β
Streamlined IT asset disposal ensuring data security and compliance
βοΈ Operations Manager / Fleet Coordinator
Exclusive Elevations LLC (Amazon DSP) | Essex, MD | November 2019 - March 2023
Operations & Technical Management:
- π Managed 45-vehicle fleet with focus on operational uptime and maintenance optimization
- π₯ Supervised and trained 25-40 drivers daily with performance evaluation systems
- π§ Conducted technical troubleshooting for on-road equipment issues
- π Utilized technology platforms for route optimization and performance tracking
- π Maintained comprehensive documentation and daily operational logs
Key Achievements:
- β
99%+ fleet availability through proactive maintenance
- β
Led 40-person team with focus on efficiency and customer service
- β
Implemented systematic documentation improving operational visibility
π Continuous Learning
Recent Professional Development:
- π Designing Effective Cybersecurity Tabletop Exercises (LinkedIn Learning)
- π Designing and Implementing Effective Cybersecurity Controls (LinkedIn Learning)
- π The Cybersecurity Threat Landscape (LinkedIn Learning)
- π Microsoftβs Career Essentials in Cybersecurity
π GitHub Stats
<div align="center">

</div>
π― What Iβm Looking For
Iβm actively seeking opportunities in:
- π SOC Analyst positions (Tier 1/2)
- π» IT Support Specialist roles
- π‘οΈ Security Operations positions
- π₯οΈ Help Desk/Desktop Support roles
- π§ Systems Administrator positions
Ideal Work Environment:
- Organizations valuing security-first mindset
- Teams emphasizing continuous learning and growth
- Roles requiring IAT Level II compliance (government/defense)
- Positions leveraging both technical skills and customer service excellence
π¬ Letβs Connect!
<div align="center">
Iβm always interested in connecting with fellow cybersecurity professionals, IT specialists, and potential employers!
%20255--7315-orange?style=for-the-badge&logo=phone&logoColor=white)
π‘ Fun Facts About Me
- π Former college football coach at 7 universities including Penn State
- π Contributed to 6 Conference Championships and 1 National Championship Game appearance
- π― Transitioned from 17-year coaching career to cybersecurity
- π Presidentβs List graduate student
- π‘οΈ Passionate about making the digital world safer
"Combining leadership experience with technical expertise to protect and serve in the cybersecurity domain."
</div>
π Repository Contents
This portfolio repository contains:
- π Updated resume (ATS-optimized)
- π Cybersecurity project reports
- π― Threat intelligence analyses
- π Technical documentation samples
- π¬ Lab exercise results
<div align="center">
β If you found my profile interesting, please consider leaving a star! β

</div>β
Observation: Create successful: /app/GitHub_Profile_README_Updated.md