Cyber Security Engineer
Fort Worth, TX, USA
Cybersecurity Engineer with 5+ years of experience in Application Security, Penetration Testing, and Threat Detection. Skilled in web, API, mobile, and network pen testing, Secure Code Review (Java, .NET, Python, NodeJS), SIEM & SOAR platforms (Splunk, QRadar, Phantom), EDR tools, and cloud security across AWS, Azure, and OCI. Experienced in Incident Response, Malware Analysis, Forensics, and compliance reporting.
TechWize
Mar 2024 โ Present
Conducted penetration testing on web, API, mobile, thick client, and wireless systems. Performed secure code reviews, application security architecture design, and threat modeling. Executed AI/LLM and SAP penetration tests. Oversaw AWS and Azure secure configuration reviews. Built Splunk dashboards and QRadar correlation rules. Automated SOAR playbooks in Phantom. Led incident response for critical events. Managed endpoint defenses with CrowdStrike Falcon and Carbon Black. Conducted threat hunting with MITRE ATT&CK mapping. Embedded DevSecOps in Kubernetes, Docker, and Jenkins pipelines. Supported PCI DSS, ISO 27001, HIPAA, and GDPR compliance audits.
Caribou Thunder
Jun 2022 โ Feb 2024
Designed and maintained enterprise LAN, WAN, and VLAN infrastructures. Configured Cisco, Palo Alto, and Fortinet routers, firewalls, and VPNs. Conducted network vulnerability assessments and wireless penetration tests. Supported AWS and Azure hybrid networking. Developed IDS/IPS signatures with Snort and Suricata. Automated network monitoring with Python and Bash. Integrated Splunk telemetry with network devices. Deployed DLP solutions. Conducted forensic packet captures with Wireshark and tcpdump. Supported compliance-driven assessments for NIST and ISO 27001.
Unum Group
Jun 2020 โ May 2022
Performed SAST and DAST testing of customer-facing apps, identifying SQLi, XSS, and authentication weaknesses. Executed penetration testing on APIs and web systems. Supported secure code reviews for Java and Python. Participated in threat modeling. Investigated phishing, malware, and insider activity. Tuned SIEM detection content in Splunk and QRadar. Automated incident response playbooks with SOAR. Conducted endpoint forensics with CrowdStrike Falcon. Performed AWS cloud configuration reviews. Documented policies and audit evidence supporting ISO 27001 and NIST compliance.