Cybersecurity practitioner with 13+ years across threat intelligence, incident response, and security operations. I build detection systems, automate response workflows, and turn noisy telemetry into decisions.


Over the last 13+ years, I've worked across consulting and enterprise environments, including engagements with both government and private organisations. I began my career doing hands-on security assessments — vulnerability assessments, penetration testing, and security reviews — before moving into threat intelligence and security operations.
My core strength is taking messy, unclear security problems and turning them into practical outcomes: cleaner detections, faster response, and less unnecessary noise for security teams. I spend a lot of time working with OSINT and security automation, building focused tools including GenAI-assisted workflows that help teams move faster without compromising fundamentals.
Clarity over noise — The goal isn't more alerts; it's fewer surprises. Simple to understand, easy to operate.
Automate the repeatable — If a task happens more than a few times, it deserves automation. Human time goes to judgment.
Trust, but verify — OSINT and telemetry are inputs, not truth. Validate signals, corroborate sources, document assumptions.
Build with empathy — Security should enable teams, not block them. Make secure paths the easiest paths.
Rapid threat response & containment across global enterprise environments.
Practical notes on cybersecurity, threat intelligence, OSINT, and incident response. No fluff — just things that work.
Security automation, threat intelligence, mentorship, or just talking shop — I'm always open to connecting with the community.