Cybersecurity practitioner with 13+ years across threat intelligence, incident response, and security operations. I build detection systems, automate response workflows, and turn noisy telemetry into decisions.


Over the last 13+ years, I've worked across consulting and enterprise environments, including engagements with both government and private organisations. I began my career doing hands-on security assessments, vulnerability assessments, penetration testing, and security reviews, before moving into threat intelligence and security operations.
My core strength is taking messy, unclear security problems and turning them into practical outcomes: cleaner detections, faster response, and less unnecessary noise for security teams. I spend a lot of time working with OSINT and security automation, building focused tools including GenAI-assisted workflows that help teams move faster without compromising fundamentals.
Clarity over noise: The goal isn't more alerts; it's fewer surprises. Simple to understand, easy to operate.
Automate the repeatable: If a task happens more than a few times, it deserves automation. Human time goes to judgment.
Trust, but verify: OSINT and telemetry are inputs, not truth. Validate signals, corroborate sources, document assumptions.
Build with empathy: Security should enable teams, not block them. Make secure paths the easiest paths.
Amazing organizations that shaped my journey over 13+ years.
Practical notes on cybersecurity, threat intelligence, OSINT, and incident response. No fluff, just things that work.
Security automation, threat intelligence, mentorship, or just talking shop. I'm always open to connecting with the community.