Detailed Career Experience

Thank You for taking the time to visit my Career Experience site.


Director of Security Operations

Career Spotlight

Recruited as Director of Security Operations, I was tasked with entirely rebuilding the cybersecurity operations program to align with rigorous industry standards. I architected and scaled the Enterprise Security Operations function across five core domains: Security Operations, Threat Intelligence, Vulnerability Management, Incident Response, and Security Architecture & Engineering. The following outlines my strategic 30-60-90 day execution plan, followed by key achievements across each functional pillar.

Emergency Stopgap (First 30 Days)

Goal: To stabilize and secure the environment with current tooling and processes until tools and program upgrades could be established.

  • Scaled staff from two to six engineers.

  • Reviewed the current state of security tools, detection, and response.

  • Reviewed the Managed Detection and Response (MDR) status and response capabilities.

  • Established Incident Response (IR) processes.

  • Maintained a secure environment with zero impactful cyber events.

60-Day Plan

Goal: To improve tooling and processes, and to scale the program.

  • Scaled staff from six to eight members and established clear roles, divisions, and levels (e.g., Analysts, Engineers, VM Analysts, and an Incident Response Lead).

  • Began replacing the MDR provider with a best-in-breed solution.

  • Began replacing Endpoint Detection and Response (EDR) systems.

  • Began upgrading the Vulnerability Management (VM) program and systems.

  • Began replacing the Security Information and Event Management (SIEM) system and supporting infrastructure.

  • Began updating and improving People, Process, and Technology (PPT).

  • Established onboarding and training programs for team members.

90-Day Plan

Goal: Direction shift to assume ownership for the implementation of new tooling and programs.

  • Scaled staff from eight to ten members.

  • Assumed ownership of implementing two new EDR systems, with a goal to complete within 30 days.

  • Assumed ownership of implementing the VM program and new systems, with a goal to complete within 30 days.

  • Assumed ownership of implementing the SIEM and supporting infrastructure, with the goal to onboard critical assets within 30 days, followed by continuous integration.

Over the next two years, I drove continuous iteration, executing short, targeted sprints to achieve the long-term strategic goals of the Security Operations Program. The three-year roadmap was structured as follows:

  • Year One: Stabilize, secure, review, and drive exponential growth.

  • Year Two: Establish foundational capabilities, refine processes, and mature operations.

  • Year Three: Sustain maturity, consolidate tooling, and drive automation.

    Below I have listed key achievements for each Domain.

Threat Intelligence:

  • Architected a centralized threat intelligence system, correlating historical telemetry with daily intelligence reporting to drive proactive defense.

  • Formalized the People, Process, and Technology (PPT) framework for robust threat hunting operations.

  • Spearheaded collaborative threat intelligence-sharing initiatives focused on business-specific risks.

  • Integrated the organization into industry-wide threat intelligence sharing programs via ISAC.

  • Operationalized private threat feeds and continuous dark web monitoring to identify external risks early.

  • Directed outsourced threat hunting engagements leveraging advanced EDR and SIEM data analytics.

Vulnerability Management:

  • Implemented a centralized tracking system to correlate and prioritize vulnerabilities based on enterprise location.

  • Established a program to identify asset ownership and assign responsibility to the correct levels, driving remediation rates to 90%.

  • Created a continuous feedback loop to track and resolve complex issues and assignments.

  • Defined and created two key positions dedicated to governance and tooling management.

  • Reduced the overall vulnerability footprint by 90% within six months.

  • Integrated vulnerability findings into the broader enterprise risk register, ensuring non-remediable vulnerabilities were properly cataloged, tracked, and addressed at the executive level

Incident Response:

  • Overhauled the Incident Response Program to achieve true 24/7 operational readiness and compliance.

  • Formalized critical escalation pathways and clear chains of responsibility across the enterprise.

  • Standardized the People, Process, and Technology (PPT) framework governing response actions across the entire incident lifecycle.

  • Spearheaded organization-wide awareness initiatives, educating the user base on proper security protocols and incident reporting.

  • Achieved a major organizational milestone by successfully detecting and thwarting external penetration testing activities for the first time in company history.

Security Architecture and Engineering:

  • Architected and executed the end-to-end migration and replacement of the enterprise SIEM solution.

  • Engineered and deployed two robust Endpoint Detection and Response (EDR) systems to maximize coverage.

  • Instituted a rigorous, structured firewall review process to ensure continuous compliance and risk mitigation.

  • Standardized and optimized the policies governing all active security tools across the environment.

  • Formulated comprehensive security policies and procedures to secure containerized workloads and infrastructure.

Summary

My tenure as Director of Security Operations was multifaceted and highly collaborative. I partnered closely with director-level peers across the enterprise to design and implement a robust, cost-effective security program optimized for our specific budget and risk profile. The true value of these rebuilt frameworks was validated during active, real-world cyber events. In every instance, our modernized tooling and rigorous protocols enabled us to identify threats early and execute rapid, successful containment with minimal business disruption. While this summary covers the core pillars of my program, there are far too many cross-functional projects and incremental advancements to list here. The finer details of this transformation are difficult to capture without writing a novel. I would welcome the opportunity to speak with you directly to discuss this experience in more depth and answer any questions you may have about my career and future aspirations.

Follow Me on LinkedIn

Contact Me