Former Navy Corpsman to cybersecurity with real-world combat experience. I bring military discipline, high-pressure decision-making skills, and a systematic approach to threat detection and incident response.
Purple Team & SOC Focus — building both offensive and defensive capabilities
Operating a 22+ VM home lab for attack simulation and detection engineering
Pursuing PSAA → PSAP → Security+ → CCDL1 → PAPA → PJPT → PNPT certification path
(Inactive) TryHackMe Top 1% - 270+ rooms completed
Actively seeking SOC Analyst & Purple Team roles
- Penetration Testing & Security Research
- Red team operations & exploitation
- Active Directory & Windows exploitation
- Network security & privilege escalation
- Threat detection & incident response
- SIEM analysis & log correlation
- Threat hunting & malware analysis
- Security monitoring & alerting
Nebula Forge is an open-source SOC platform covering the full workflow: Detect → Normalize → Hunt → Drift → Cluster → Simulate → Investigate → Respond → Report. The full suite runs as a fully containerized stack — 13 containerized tools, 15 services total, a shared Postgres backend, and a central dashboard — clone all repos with the included setup script, then a single docker compose up -d starts all services. The dashboard (port 5010) provides live status, one-click launches, and pipeline monitoring across all 18 tools in the org.
Nebula Forge includes two automated pipelines:
- Drift-scan — scheduled Sigma rule drift analysis across your detection library
- Purple-loop — end-to-end purple team cycle: discover (VulnForge) → simulate (AtomicLoop) → detect (Wazuh/Splunk) → validate (DriftWatch) → hunt (HuntForge) | Pipeline validated end-to-end April 2026
| Tool | Description |
|---|---|
| SigmaForge | Vendor-agnostic Sigma rule generator — Splunk SPL, Elastic KQL/EQL, Sentinel KQL, Wazuh XML, QRadar AQL, Detection-as-Code JSON |
| YaraForge | YARA rule generator with ATT&CK mapping and detection dashboard |
| SnortForge | Snort 2/3 rule generator with multi-content chaining, performance scoring, and 12 detection templates |
YaraForge - YARA Rule Generator & Testing Platform
Build, manage, test, and visualize YARA detection rules with MITRE ATT&CK mapping and a detection dashboard.
Python Flask YARA MITRE ATT&CK Detection Engineering
SnortForge - SnortForge - Snort IDS/IPS Rule Generator — Flask web app with multi-content chaining, Snort 2/3 syntax toggle, rule performance scoring, 12 detection templates, inline help tooltips, PCRE flag checkboxes, HTTP URI/Header matching, rule validation, and .rules file import/export. Dark-themed UI with real-time live preview. v1.2.0.
Python Flask Snort IDS/IPS Network Security
SigmaForge — Vendor-Agnostic Sigma Rule Generator
Custom conversion engine (no pySigma dependency) generating Sigma rules
to 6 SIEM backends: Splunk SPL, Elastic KQL, EQL, Sentinel KQL, Wazuh XML,
and QRadar AQL — plus Detection-as-Code JSON. MITRE ATT&CK mapping,
12 pre-built templates, rule library, and standalone CLI.
Python Flask Sigma SIEM Detection Engineering CLI
Python Flask Sigma SIEM Detection Engineering CLI
| Tool | Port | Description |
|---|---|---|
| SigmaForge | 5000 | Custom Sigma conversion engine — 6 SIEM backends, Detection-as-Code JSON, no pySigma dependency |
| YaraForge | 5001 | YARA rule builder with live scanning, MITRE ATT&CK tagging, SQLite storage |
| Threat-Intel-Dashboard | 5002 | IOC reputation lookup — VirusTotal, AbuseIPDB; auto-type detection; demo mode |
| SnortForge | 5003 | Snort 2/3 rule generator — multi-content chaining, PCRE, 0–100 performance scorer |
| SIREN | 5004 | NIST 800-61 IR report builder — timeline, IOC tracking, composite severity scoring |
| EndpointForge | 5005 | Cross-platform HIDS — process, FIM, network, registry, persistence — Wazuh export |
| Tool | Port | Description |
|---|---|---|
| LogNorm | 5006 | ECS-lite log normalizer for disparate SIEM sources |
| HuntForge | 5007 | ATT&CK-mapped threat hunt playbook generator |
| DriftWatch | 5008 | Sigma rule drift analyzer — feeds the drift-scan pipeline |
| ClusterIQ | 5009 | Behavioral alert clustering engine for SOC triage noise reduction |
| AtomicLoop | 5011 | Atomic Red Team runner — feeds the purple-loop pipeline |
| VulnForge | 5012 | Exploit intel aggregator → ATT&CK mapping → pipeline trigger |
| WifiForge | 5013 | 802.11 threat detector with deauth/rogue AP detection → LogNorm export |
LogNorm - Log Source Normalizer (port 5006)
Normalizes log sources from disparate inputs into a consistent ECS-lite schema for downstream detection and analysis pipelines.
Python Flask Log Normalization ECS SIEM
HuntForge - MITRE ATT&CK Hunt Playbook Generator (port 5007)
Generates structured threat hunting playbooks mapped to MITRE ATT&CK techniques, providing analyst-ready queries and investigation checklists.
Python Flask MITRE ATT&CK Threat Hunting Detection Engineering
DriftWatch - Sigma Rule Drift Analyzer (port 5008)
Analyzes Sigma rule libraries for drift — identifying stale, misconfigured, or coverage-gapped rules over time. Feeds the drift-scan pipeline.
Python Flask Sigma Detection Engineering Rule Management
ClusterIQ - Contextual Alert Clustering Engine (port 5009)
Groups and contextualizes alerts using behavioral clustering to reduce noise and surface high-fidelity incident signals for SOC triage.
Python Flask Alert Clustering SOC Incident Response
AtomicLoop — Atomic Red Team Test Runner (port 5011)
Executes Atomic Red Team tests in controlled loops for purple team validation, feeding results into the purple-loop pipeline for detection coverage measurement. Dedicated purple loop target: Win10x2 (Wazuh agent 005, AtomicLoop-Test).
Python Flask Atomic Red Team Purple Team MITRE ATT&CK
VulnForge - Vulnerability & Exploit Intelligence Tool (port 5012)
Aggregates exploit intelligence from ExploitDB, NVD, and Metasploit, maps findings to MITRE ATT&CK techniques, and feeds results into the purple team pipeline — generating hunt playbooks, LogNorm-ready exports, and AtomicLoop simulation triggers from a single search.
Python Flask MITRE ATT&CK Vulnerability Intelligence Purple Team
WifiForge - Wireless Network Security Analyzer (port 5013)
Passively scans wireless networks, assesses security posture, detects deauth attacks and rogue configurations, maps findings to MITRE ATT&CK techniques, and exports results to the Nebula Forge LogNorm pipeline.
Python Flask Scapy Wireless Security MITRE ATT&CK
| Tool | Description |
|---|---|
| EndpointForge | Cross-platform HIDS — process, FIM, network, registry, autoruns with Wazuh NDJSON export |
| EndpointTriage | PowerShell IR artifact collector — processes, persistence, event logs, Sysmon, HTML report output |
EndpointForge - Cross-Platform Endpoint Security Monitor
Host-based intrusion detection and endpoint triage across 5 modules: process execution, file integrity (SHA-256 FIM), network connections, registry persistence (Windows), and autoruns — all MITRE ATT&CK mapped. Includes Wazuh export integration: POST /api/wazuh/export writes NDJSON picked up by the Wazuh agent using bundled decoder and rules (IDs 100200–100265) with ATT&CK technique tags — no manual log shipping. Markdown/JSON report generation for IR workflows.
Python Flask MITRE ATT&CK HIDS Endpoint Security Wazuh
EndpointTriage - Windows Endpoint Forensic Artifact Collector
Automated PowerShell-based IR triage script that collects volatile and non-volatile forensic artifacts — running processes with hashes, network connections, registry persistence checks, scheduled tasks, event log extraction (Security, Sysmon, PowerShell, Defender), named pipe enumeration, and suspicious indicator flagging. Outputs a structured triage package with HTML summary report.
PowerShell Incident Response Forensics DFIR Endpoint Security
| Tool | Description |
|---|---|
| Log-Analyzer | SOC-focused log analysis with pattern matching and anomaly detection |
| Phishing-Analyzer | Email header and content analysis for phishing campaign identification |
Log-Analyzer - Security Log Analyzer
Python-based log analysis tool designed for SOC analysts with pattern matching and anomaly detection.
Python SIEM Log Analysis SOC
Phishing-Analyzer - Phishing Email Analyzer
Email header and content analysis tool for identifying phishing campaigns and malicious indicators.
Python Email Security Phishing Detection Blue Team
| Tool | Description |
|---|---|
| Threat-Intel-Dashboard | Real-time IOC tracking, feed aggregation, and visual analytics for SOC operations |
| ThreatTape | Live IOC threat intel feed — AbuseIPDB + OTX aggregation with MITRE ATT&CK tagging |
Threat-Intel-Dashboard - Threat Intelligence Dashboard
Real-time threat intelligence platform with IOC tracking, feed aggregation, and visual analytics for SOC operations.
HTML JavaScript Threat Intelligence OSINT SOC
ThreatTape - Live IOC Threat Intel Feed (port 5014)
Aggregates indicators of compromise from AbuseIPDB and AlienVault OTX, displays live IOC data with severity scoring, country of origin, community report counts, and MITRE ATT&CK technique tags. Falls back to curated mock data with no API keys required.
Python Flask Threat Intelligence IOC MITRE ATT&CK AbuseIPDB OTX
| Tool | Description |
|---|---|
| SIREN | NIST 800-61 incident report generator with severity scoring, IOC tracking, and timeline management |
SIREN - Security Incident Response Engine & Notation
Professional incident report generator following NIST 800-61 framework with severity scoring, IOC tracking, timeline management, and Markdown/JSON export.
Python Flask NIST 800-61 Incident Response SOC
| Tool | Description |
|---|---|
| WarGameForge | SOC investigation scenario generator — MITRE-driven, difficulty-scaled training |
WarGameForge - SOC Investigation Scenario Generator
Generates realistic SOC investigation scenarios from MITRE ATT&CK techniques — complete with SIEM alert blocks, investigation clues, red herring artifacts, and step-by-step solution walkthroughs. Difficulty-scaled from easy to hard, 12 built-in techniques plus custom input.
Python Flask SOC Training MITRE ATT&CK Detection Engineering Blue Team
| Lab | Layer | Description |
|---|---|---|
| Azure-SOC-mini-lab | Azure | KQL detections, 12 ATT&CK-mapped simulations, IR documentation, Sentinel playbooks |
| AWS-SOC-lab | AWS | CloudTrail detections, IAM/S3/EC2 attack sims, GuardDuty integration, Lambda auto-response |
Azure-SOC-mini-lab — Azure Cloud Detection Lab
KQL detections, attack simulations (12 MITRE ATT&CK techniques mapped), and IR documentation for the Azure control plane — identity, compute, and key vault planes. Built on Microsoft Sentinel / Log Analytics with anomaly-based detection, synthetic log samples, and an automated NSG response playbook.
Azure KQL Microsoft Sentinel MITRE ATT&CK Detection Engineering Cloud Security
AWS-SOC-lab — AWS Cloud Detection Lab
CloudTrail-based detections in CloudWatch Logs Insights and Athena SQL, attack simulations for IAM privilege escalation, credential exfiltration, S3 enumeration and public exposure, CloudTrail disable, and EC2 post-exploitation via SSM RunCommand — with GuardDuty finding integration, 5 IR reports, and a Lambda auto-response playbook.
AWS CloudTrail GuardDuty CloudWatch Logs Insights Athena MITRE ATT&CK Detection Engineering Cloud Security
- Nebula Forge — 13 tools containerized and live (v1: SigmaForge, YaraForge, Threat-Intel-Dashboard, SnortForge, SIREN, EndpointForge; v2: LogNorm, HuntForge, DriftWatch, ClusterIQ, AtomicLoop, VulnForge, WifiForge) + dashboard (5010) + Postgres, 15 services total — setup scripts + single
docker compose up -d - Purple team automation pipelines: drift-scan and purple-loop validated end-to-end April 2026
- PSAP 2026 — SOC analyst and detection engineering roles
- Expanding Wazuh SIEM detections and Splunk correlation rules
In Progress:
- 🔹 PSAA (Practical SOC Analyst Associate) - 2026*
- 🔹 PSAP (Practical SOC Analyst Professional) - Scheduled Q4 2026
Certification Roadmap: PSAA → PSAP → Sec+ → CCDL1 → PAPA → PJPT + PNPT
22+ VM Purple Team Lab:
- Active Directory lab (attack & defense)
- Snort IDS/IPS network monitoring
- Web vulnerability testing environment
- Malware analysis sandbox
- WiFi penetration testing lab
- Flipper Zero / Pwnagotchi
- Wazuh SIEM with Sysmon integration & MITRE ATT&CK-mapped detections (5 agents: Windows, Linux)
- Splunk Free on Ubuntu for detection and hunt workflows
Breaking to Build. Defending to Endure.





