WILLIAM (LIAM) BRIGDEN
Chicago, Illinois
***************@*****.*** 312-***-**** LinkedIn
PROFESSIONAL SUMMARY
Musician with knowledge and education in the cybersecurity field with a keen awareness and understanding in areas of problem-solving, discipline, and adaptability. Ability to analyze complex systems, lead teams, and develop structured learning approaches. Self-starter, problem-solver, and team player with a growing knowledge of technical, analytical, and communication skills. Fast learner with the ability to grasp emerging technologies, new threats, and concepts.
EDUCATION
University of Chicago
Network Security, Microsoft Security, Network Administration, Cyber Security Infrastructure Western Washington University
Music Performance
Harold Washington College
Music Performance
CERTIFICATIONS
CompTIA Security+ — Earned May 2025
CC ISC2
GAIPC
TECHNICAL SKILLS
Operating Systems: Windows, macOS, Linux
Networking: Cloud Security, Threat Analysis
Programming Language: Python
Tools & Platforms: AWS, Splunk, Microsoft Sentinel, Kibana, Graylog, OWASP Top 10, API Threat Detection CYBERSECURITY PROJECTS
Cybersecurity Labs, University of Chicago (April 2024 – March 2025)
● Implemented cloud threat responses using AWS
● Analyzed logs and security events in Splunk
● Investigated and responded to alerts in Microsoft Sentinel PROFESSIONAL EXPERIENCE
Music Director, Wicker Park Lutheran Church Summer Camp (June – August 2023)
● Led music instruction for groups of up to 50 students
● Coordinated performances and developed structured lesson plans General Grocery Associate, Jewel Osco (June – December 2022)
● Developed organizational systems to improve efficiency
● Led, coordinated, and assigned responsibilities with coworkers Cybersecurity Labs, University of Chicago (April 2024 – March 2025) Implemented cloud threat responses using AWS
Analyzed logs and security events in Splunk
Investigated and responded to alerts in Microsoft Sentinel Home Lab Projects (Ongoing, 2024–2025)
Designed and configured a home SOC analyst lab using pfSense, Windows 10, and Ubuntu VMs Simulated real-world threat detection with host-based logging and network segmentation Practiced log analysis and SIEM correlation using open-source tools like Graylog and Kibana Hardened Windows and Linux systems through user access control, patching, and baseline security policies Developed and tested firewall rules, IDS alerts, and simulated phishing attempts for detection and response