Summary
U.S. Space Force Cyber Threat Emulator with expertise in adversary emulation, offensive security automation, and AI-driven security systems. Architect of automated attack simulation platforms, enterprise SIEM systems, and autonomous LLM agents. Winner of national-level cyber competitions including Presidents Cup. Combines classified operational experience with production-grade software engineering across Python, Rust, and TypeScript.
Experience
U.S. Space Force, 630th Cyberspace Squadron · Vandenberg SFB
- Lead full-spectrum adversary emulation campaigns for Space Force and joint cyber exercises, improving defensive posture across critical space systems
- Architected and operate 70+ node cyber ranges replicating enterprise, mission, and adversary infrastructure at scale
- Developed ATT&CK-aligned threat emulation playbooks adopted across multiple exercises, increasing detection capability validation
- Serve dual red cell/white cell role, managing exercise control and learning outcomes for 50+ participants per engagement
- Transform red team findings into detection engineering improvements, enhancing SOC alert fidelity
Competition Wins
- Guardian Galactic Gauntlet
- Presidents Cup
- SANS Competitions
U.S. Space Force, 630th Cyberspace Squadron
- Triage 200+ alerts weekly across SIEM, EDR, and NDR with sub-30-minute critical response times
- Correlate endpoint, network, and log telemetry for threat hunting and incident response operations
- Author threat intelligence reports translating technical findings into actionable risk assessments