U.S. Navy Veteran | Active Secret Clearance | Network Engineer @ SAIC (TACNET ISEA)
MS Data Science (AI Optimization) — National University (In Progress)
Cybersecurity professional and U.S. Navy veteran transitioning from network engineering into threat intelligence and security data science. I combine hands-on experience in SIEM log analysis, vulnerability management, and tactical network defense with a growing skill set in Python, statistical modeling, and machine learning — building toward a career applying data science to real-world cyber threats.
| Project | Description | Tech Stack |
|---|---|---|
| Threat Intel Feed Analyzer | Automated IOC enrichment pipeline with MITRE ATT&CK mapping and threat visualization | Python, AlienVault OTX, MITRE ATT&CK |
| Teardrop Anomaly Analysis | Simulated IP fragmentation attack analysis with packet-level forensics and statistical visualization | R, Wireshark, dplyr, ggplot2 |
Threat Intelligence & Cybersecurity
SIEM Log Analysis (Splunk) · Vulnerability Management (Nessus, Action1) · Wireshark Packet Analysis · Incident Response · MITRE ATT&CK Framework · Tactical Networks (CANES, ADNS, CENTRIXS, ISNS)
Data Science & Analytics
Python · R / RStudio · Pandas · Statistical Modeling · Exploratory Data Analysis · Data Visualization (ggplot2)
Infrastructure & Tools
Windows Server 2022 / Active Directory · Linux (Kali, Ubuntu) · AWS VPC / CloudWatch · SQL · ITIL v4
CompTIA Linux+ · Security+ · Network+ · A+ (All Active)
Axelos PeopleCert ITIL v4 (Active)
MS Data Science (AI Optimization) — National University (In Progress)
BS Cybersecurity Technology — University of Maryland Global Campus (Dec 2025)
Let's connect: LinkedIn