I started at the help desk. Moved through systems engineering and network security, then into the SOC. I love all of it. Working alerts, hunting through telemetry for things that automated tools miss, handling incidents from first alert to resolution. Threat hunting and incident handling feed each other and I want to be good at both.
At Red Canary I hunted full time across major EDR platforms. Found a threat actor with a 2-month undetected VPN compromise running AD brute force. Identified malicious LNK files pointing to C2 and infostealers like Chihuahua Stealer. I got to take real hunts and work with the detection engineering team to convert them into production rules.
Now I'm at Secnap Network Security where I wear a lot of hats. I'm the threat hunter, digging through raw EDR telemetry across customer environments to find what the automations miss. I handle incidents end-to-end, from triage and investigation through containment and customer communication. I've also built the entire customer portal, SOC dashboard, workflow system, and response processes from the ground up.
I've also been developing agentic AI agents for the SOC and threat hunting teams. Agents that triage incoming threats and baseline identity activity to support hunts. It's still early, but it's already changing how we work.
I'm not a developer by background, but I've gotten hands-on building the tools our team needs. I like solving problems and I like building things that make security operations better.