Security Analyst Β |Β SOC Analyst Β |Β IAM Analyst Β |Β Cloud Support Engineer Β |Β Systems Administrator
Open to full-time opportunities
IT professional with 8+ years in systems support and administration, now transitioning into cybersecurity. Currently an IT Support Specialist actively pursuing a BS in Cybersecurity & Information Assurance at WGU (CAPSTONE remaining). My hands-on work spans cloud security, SIEM deployment, vulnerability assessment, and identity management β backed by multiple industry certifications and a live homelab running a full defensive security stack.
I'm actively seeking roles in: Security Analysis Β· SOC Operations Β· Identity & Access Management Β· Cloud Security Β· Systems Administration
| Project | Description | Link |
|---|---|---|
| Microsoft Sentinel SIEM β Azure | Deployed a cloud SIEM with a live Windows 11 honeypot exposed to the internet. Captured real-world RDP brute-force attempts, wrote KQL queries to detect and geolocate attack sources, and built an attack map Workbook in Sentinel. | View Project |
| Nessus Vulnerability Assessment | Conducted a full vulnerability assessment against Windows 10, Ubuntu Server, and pfSense VMs in an isolated lab. Identified 3 Critical and 12 High findings (including Apache CVE-2021-41773 and SMB Signing), documented CVE/CVSS scores, and produced a formal remediation plan. | View Project |
| Secure Access with Azure AD / Entra ID | Configured users, groups, SSPR, and per-user MFA in a Microsoft Entra ID cloud lab. Built around a realistic enterprise scenario with a fictional company and new-hire onboarding workflow. | View Project |
| Phishing Attack Simulator | Simulating real-world phishing scenarios to test user awareness and security readiness. | π§ Coming Soon |
My homelab runs on a Proxmox hypervisor with isolated network segments β one for simulated attack traffic, one for defensive tooling β allowing me to practice real-world detection and response in a controlled environment.
| Tool | Role |
|---|---|
| Wazuh | Host-based intrusion detection & SIEM |
| Snort | Network intrusion detection (inline) |
| Zeek | Passive network traffic analysis & logging |
| TheHive | Incident response & case management |
| Shuffle SOAR | Security automation & alert orchestration |
| TrueNAS | Network-attached storage for log retention |
π‘ Add your Credly links to the Security+, CySA+, and Network+ badges so recruiters can verify them directly.
Deepening cloud security expertise with the ISC2 CCSP and Linux administration skills with the Red Hat RHCSA.
Β© 2026 @Techkeemout β New Jersey Β· Open to opportunities in cybersecurity and cloud security.