PROFESSIONAL EXPERIENCE
Kimberly-Clark — Birmingham, AL
Threat Detection & Response Manager Threat Intelligence & Threat Hunting Lead (2022–Present)
Lead a high-performing Threat Hunting team with strong analytical and detection capabilities.
Built and insourced a dedicated SOC, establishing technologies, processes, and workflows for enterprise-level monitoring, detection, and response.
Understanding of cybersecurity principles, best practices, and control frameworks.
Integrated SOC operations with the incident response function, improving speed, consistency, and organizational resilience.
Partnered with Legal, Risk, Information Services, and Compliance to align security operations with business and regulatory needs.
Delivered timely briefs and early escalation of high-impact events to senior leadership.
Led insider-threat investigations and maintained cybersecurity playbooks and runbooks.
Managed vendor relationships, including evaluation, performance oversight, and contract alignment.
Vulcan Materials — Birmingham, AL
Senior Security Analyst (2018–2022)
Led enterprise incident response and managed SOC contracts, ensuring rapid and effective mitigation of threats.
Conducted insider-threat investigations and advanced network, endpoint, and log analysis using SIEM tools.
Managed penetration test program
Evaluated third-party tools from investigation and POC through implementation.
Produced timely briefs and escalations for company-impacting events.
Collaborated with Legal, Risk, Information Services, and Compliance to support enterprise security initiatives.
Designed and implemented cybersecurity solutions based on emerging threats and business requirements.
Mentored junior analysts and coordinated cross-training with other technical teams.
Managed vendor risk, interpret SOC 2 Type II reports, and developed vendor-assessment questionnaires.
Understanding of cybersecurity principles, best practices, and control frameworks
General Motors — Austin, TX
Security Analyst (2016–2018)
Conducted advanced intrusion detection, malware analysis, and incident remediation.
Monitored IPS/IDS/PCI events and analyzed firewall, server, and network logs to identify malicious activity.
Performed host- and network-level analysis using SIEM and packet-capture tools.
Developed and refined detection criteria based on malware behavior and threat intelligence.
Humana — Louisville, KY
Security Analyst (2013–2016)
Conducted intrusion detection, incident remediation, and malware analysis.
Monitored IPS/IDS/PCI events, analyzed firewall and server logs, and executed remediation actions such as ACL/URL blocks and workstation recovery.
Performed email-based threat analysis and managed whitelisting/blacklisting decisions.
EDUCATION
M.S., Digital Forensics — Champlain College
M.S., Information Security & Assurance — Western Governors University
B.S., Computer Information Systems — University of Indianapolis
B.S., Psychology — University of Indianapolis
Minor, Business Administration/Accounting — University of Indianapolis
CERTIFICATIONS
CISSP — Certified Information Systems Security Professional
CEH — Certified Ethical Hacker
Security+ — CompTIA
CHFI — Computer Hacking Forensic Investigator
SEC503: Intrusion Detection In-Depth (GCIA)
Certified ISO-27000 Specialist
NSTISSI No. 4011 & 4012 (INFOSEC Professionals)
SKILLS
Threat Detection & Response, SOC Leadership & Operations, Threat Hunting & Intelligence, Incident Response & Forensics, Insider Threat Investigations, SIEM & Log Analysis, Malware Analysis, Cross-Functional Collaboration, Vendor & Third-Party Risk Management, Playbook & Runbook Development, Staff Development & Mentorship