I'm a cybersecurity professional and IT consultant transitioning into Cloud Security Engineering. I hold CompTIA Security+ and have spent the last several months building hands-on experience through homelab environments, security automation tools, and real-world client IT work across healthcare and transport industries.
Currently targeting Security Analyst and SOC Analyst roles while building toward Cloud Security Engineer and AI Security Specialist long term.
| Certification | Issuer | Date Earned |
|---|---|---|
| CompTIA Security+ (SY0-701) | CompTIA | April 2026 |
| Google AI Essentials | April 2026 | |
| Google Prompting Essentials | April 2026 |
π In progress: AWS Certified Cloud Practitioner (Target: July 2026)
18 production-ready security automation tools built across core cloud security domains π [github.com/CodeBroKinty/python-automation-labs]
- S3 Security Auditor β Detects misconfigurations (public access, encryption, versioning, logging) with risk scoring (CRITICAL / HIGH / MEDIUM / LOW) β targets class of vulnerability behind the Capital One breach ($190M settlement)
- IAM Permission Analyzer β Flags missing MFA, excessive admin access, and unused credentials across AWS accounts
- EC2 Inventory Tool β Asset discovery with automated security analysis flagging public IP exposure and default security groups
- Cost Monitor β Service breakdown, trend analysis, and month-end forecasting to prevent unauthorized spend
- Port Scanner β 100 concurrent threads, scans 1,000 ports in under 10 seconds (100x speedup vs sequential)
- Service Detector β Banner grabbing with OS fingerprinting to identify vulnerable software versions
- Ping Sweep β CIDR notation network discovery and asset mapping
- Unified Scanner β Complete host discovery, port scanning, and service enumeration in a single workflow
- Brute-Force Detector β 3-layer detection: velocity attacks, distributed coordinated IPs, and account enumeration patterns
- Authentication Log Parser β Regex-based threat correlation and attack pattern identification
- File Integrity Monitor β Real-time SHA-256 cryptographic hashing to detect unauthorized file modifications
- Security Reporter β Multi-format exports (CSV, Markdown, JSON) for stakeholder communication
Deployed Splunk, ingested endpoint and authentication log data, and performed threat hunting using SPL queries. Identified simulated security incidents including failed login patterns, off-hours authentication, and privilege escalation attempts. Documented findings in incident report format.
Skills: Splunk, SIEM, SPL Queries, Log Analysis, Threat Hunting, Incident Documentation
Deployed Wazuh open-source EDR platform across a multi-OS homelab environment (Windows and Linux). Configured endpoint agents, triggered and analyzed security alerts including failed logins and file integrity changes, and documented findings using industry-standard incident reporting format.
Skills: EDR, Wazuh, Endpoint Monitoring, Alert Triage, Incident Reporting, Linux, Windows Server
Performed live packet capture, traffic baselining, and SOC-style forensic triage of a real-world NetSupport Manager RAT infection using Wireshark on Parrot OS. Identified all 5 IOCs from raw packet data including infected host IP, MAC, hostname, user account, and full name. Includes incident report, IOC documentation, and annotated screenshots.
Skills: Wireshark, Packet Analysis, Network Forensics, TCP/IP, DNS, Kerberos, NBNS, SAMR, Nmap, Parrot OS, Linux, Incident Response, IOC Extraction, C2 Traffic Detection, Display Filter Development, Threat Triage
Designed and administered a Windows Server Active Directory environment simulating a multi-department organization. Implemented joiner/mover/leaver (JML) lifecycle management, role-based access control (RBAC) via security groups, Group Policy configuration, and access auditing. Identified and documented accounts with excessive permissions as mock audit findings.
Skills: Active Directory, IAM, RBAC, GPO, JML Lifecycle, Access Auditing, Windows Server
VirtualBox environment running Kali Linux (attacker), Ubuntu (analyst), and Parrot OS alongside a Windows victim machine for penetration testing, log analysis, and defensive security practice.
Skills: Kali Linux, Parrot OS, Ubuntu, Windows, VirtualBox, Network Scanning, Threat Analysis
Languages: Python 3.10+, Bash, SQL (foundational), HTML, CSS
Cloud: AWS (EC2, S3, IAM, Cost Explorer), boto3 SDK
Security Tools: Splunk, Wazuh, Nessus, MITRE ATT&CK, Fail2Ban concepts, Tripwire concepts
IAM & Identity: Active Directory, RBAC, Group Policy, User Lifecycle Management (JML)
Networking: TCP/IP, DNS, DHCP, SSH, HTTP/HTTPS, MX Records, Port Scanning, Banner Grabbing, OS Fingerprinting, CIDR Notation
Operating Systems: Linux (Ubuntu, Kali, Parrot OS), Windows Server, Windows 10/11
Concepts: Threat Detection, Log Analysis, Incident Response, Vulnerability Management, NIST, HIPAA, Cloud Security, File Integrity Monitoring
Tools: Git, GitHub, VS Code, VirtualBox, Obsidian, Notion
| Platform | Path | Status |
|---|---|---|
| TryHackMe | Pre-Security Path | β Completed |
| TryHackMe | Cyber Security Path | π 60% Complete |
| AWS | Cloud Practitioner | π In Progress (July 2026) |
- IT & Digital Systems Consultant β Infrastructure support, Google Workspace administration, and DNS/domain management for healthcare and transport clients in Arkansas and DFW
- Pharmacy Automation Specialist β Operated and troubleshot the Omnicell M5000 automated dispensing system alongside Omnicell engineering staff in a high-stakes, zero fault-tolerance environment
- 7 Years Trading Experience β SPY, IWM, QQQ including 0DTE options strategies with structured risk management
- βοΈ AWS Cloud Practitioner β in progress (Target: July 2026)
- π¬ Expanding homelab with cloud-integrated security monitoring
- π CompTIA SecAI+ (CY0-001) β roadmap target
- βοΈ AWS Security Specialty β roadmap target
- ποΈ AWS Solutions Architect β roadmap target
- π€ AWS Machine Learning Specialty β roadmap target
- π― Open to: Security Analyst Β· SOC Analyst Β· IT Support Β· Cloud Security Engineer
π DFW Area β Remote & Hybrid Open
π‘ Building in public. Documenting the journey from trader to cloud security engineer.