SOC Analyst who automates the boring parts
I break into things so I can tell you exactly how to fix them.
Automating the noise out of security operations. Building SOAR workflows that actually work, making AI do the heavy lifting, and poking at systems until they confess their vulnerabilities. Also the regular SOC stuff — monitoring, hunting, responding — consider that the warm-up act.
My official title says SOC Analyst. It's wrong — but "professional chaos engineer with a badge" didn't fit on the business card.
SOC Analyst
Making security operations less boring, one automation at a time. Building SOAR workflows that kill alert noise before it reaches a human. Teaching AI to do the grunt work. Running VAPT engagements because the best defense is knowing exactly how things break.
SOC Analyst Intern
The origin story. Stared at SIEM dashboards until the patterns started making sense. Hunted phish, chased threats, wrote reports that people actually read. The kind of gig that turns textbook theory into muscle memory.
Bachelor's Degree
3-year technical baccalaureate followed by a networking and security bachelor's. The academic foundation before all the real-world chaos. Learned how networks talk, how they break, and how to keep them from breaking — mostly.
Developer & Consultant
Built websites, broke them, fixed them, launched them. Dealt with clients requesting "one more change" at 11 PM across time zones. Cut my teeth on everything from quick patches to full architecture. Then fell down the cybersecurity rabbit hole and never looked back.