forked from ESultanik/PDFGitPolyglot
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
13 additions
and
15 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,15 +1,14 @@ | ||
\documentclass[../../../main.tex]{subfiles} | ||
\begin{document} | ||
\begin{itemize} | ||
\item Ransomware threat actors contained and eradicated post-foothold | ||
\item Developed custom honeypots, incident response tools, and data analysis tools | ||
\item Detection lab created and maintained for purple teaming | ||
\item Used Detection-as-Code principles to write detections at scale | ||
\item Led investigations in high-pressure security events | ||
\item Mentored junior members of the SOC | ||
\item Contained and eradicated multiple ransomware threat actors post-foothold | ||
\item Wrote detections at scale using a detection-as-code approach | ||
\item Built and maintained a detection lab environment | ||
\item Pentested APIs, web applications, embedded systems, and mobile apps | ||
\item Worked with cross-functional teams to reduce workstation attack surface | ||
\item Developed custom honeypots, incident response tools, and data analysis tools | ||
\item Created CI/CD pipelines for custom tooling and detections-as-code | ||
\item Administered security infrastructure on Linux and Windows systems | ||
\item Administered security infrastructure such as BloodHound and Hashtopolis | ||
\item Reduced workstation attack surface by working with cross-functional teams | ||
\end{itemize} | ||
\end{document} |