// CLEARANCE: ACTIVE TS/SCI  •  LOCATION: GREATER ORLANDO, FL  •  STATUS: AVAILABLE FOR REMOTE SOC / GRC / ISSM ROLES

Operational Cybersecurity Analyst
Defending Classified & Enterprise Networks.

Six-plus years on the wire — from a 24/7 NOC at USAF Ramstein to senior ISA/ISSM support at Lockheed Martin, and AI-driven threat work at Invisible Technologies. SIEM tuning, incident response, and NIST-aligned compliance built in environments where downtime is not an option.

SOC Analyst GRC Analyst Cybersecurity Analyst SOC 2 / ISO 27001 Remote / Hybrid
6+
Years Operational
100+
Alerts Triaged / Shift
24/7
NOC / SOC Tempo
TS/SCI
Active Clearance
$ cat ./service_record.log

Service Record

DEC 2025 → PRESENTInvisible Technologies — Remote (Contract)

AI Cybersecurity Specialist

  • Operate as a domain SME training and red-teaming AI models on cybersecurity reasoning, adversary tradecraft, and defensive architecture.
  • Author, validate, and grade SOC, GRC, and threat-hunting scenarios used to harden frontier model outputs.
  • Bridge analyst tradecraft with AI evaluation — exposing failure modes a human SOC analyst would catch.
JUN 2024 → JAN 2026Lockheed Martin — Jacksonville, FL

Senior Multi-Functional Security Analyst

  • Maintained Information System Security posture across classified DoD programs aligned to NIST 800-53 and RMF controls.
  • Led vulnerability remediation, audit prep, and POA&M tracking; supported ATO sustainment for production systems.
  • Coordinated with ISSM, security control assessors, and engineering teams on incident triage and configuration baselines.
SEP → NOV 2023Five Stones Research — Jacksonville, FL (Contract)

Information Assurance Analyst

  • Executed IA assessments and STIG-driven hardening across mixed Windows / Linux environments.
  • Documented control evidence and risk findings supporting RMF authorization activities under NIST 800-171.
APR 2019 → JAN 2023U.S. Air Force — Ramstein AB, Germany

NOC Engineer / Systems Administrator

  • Ran 24/7 NOC operations supporting EUCOM and AFRICOM mission networks — monitoring, triage, and incident response across classified enclaves.
  • Hardened 241 systems in a 24-hour sprint to meet emergent compliance directives — zero rework on follow-up audit.
  • Administered Active Directory, Windows Server, RHEL, and network services; executed change control under DoD STIG baselines.
$ ./loadout –list

Operator Loadout

// Detection & Response
Splunk SIEMSIEM TuningEDR / XDRIncident ResponseThreat HuntingMITRE ATT&CK
// GRC & Compliance
NIST 800-53NIST 800-171RMFCMMCISO 27001POA&M
// Infrastructure
Active DirectoryWindows ServerRHEL / LinuxVMwareCisco / NetworkingPowerShell
// Emerging
AI Threat AnalysisLLM Red TeamZero TrustCloud SecurityPython (analyst)
$ ls ./certifications/

Certifications

[✓]
GIAC Security Essentials
GSEC — SANS / GIAC
[✓]
GIAC Foundational Cybersecurity Technologies
GFACT — SANS / GIAC
[✓]
CompTIA Security+ CE
DoD 8570 IAT II Compliant
[✓]
CompTIA Network+ (N10-009)
CompTIA — 2026
[✓]
CompTIA A+
CompTIA
[✓]
ITIL 4 Foundation
PeopleCert / AXELOS
[△]
CISSP
ISC2 — In Progress (Target: Dec 2026)
$ cat ./education.txt

Education

B.S. Cybersecurity & Information Assurance
Western Governors University
Conferral: December 2026 (Expected — or sooner)
$ ./initiate_contact –priority high

Initiate Contact

Available for remote W-2 SOC / GRC / ISSM roles — TS/SCI active, NIST 800-53 / 800-171 / RMF fluent, six-plus years operational. Also open to selective 1099 / consulting conversations for CMMC, SOC 2, and AI red-team work via Southern Cyber Solutions (launching post-graduation). Encrypted channel preferred.

Scroll to Top