SOC Advisory
Cogswell Award-winning SOC leadership. Build, mature, or transform your security operations.
Cybersecurity research, threat intelligence, and detection engineering.
Cogswell Award-winning SOC leadership. Build, mature, or transform your security operations.
Build and mature detection engineering and threat intelligence programs. Detection as Code from its original authors.
Breach detection for acquisitions and MDR/MSSP provider evaluation.
Custom tooling for MSSPs and XDR providers.
SOC manager for the security team at Corvid Technologies when the team was recognized with the 2021 James S. Cogswell Outstanding Industrial Security Achievement Award — the highest honor the Defense Counterintelligence and Security Agency (DCSA) bestows upon cleared industry, awarded to just 40 of approximately 13,000 cleared contractor facilities nationwide.
Previously built and managed SOC operations for a managed detection and response (MDR) provider across classified and unclassified programs, and established a security operations center for a regional internet service provider.
Authored the first publicly available white paper on the Detection as Code methodology (2019), defining a framework for applying CI/CD pipeline practices to security detection development. The paper introduced a full lifecycle approach — from detection engineering and automated testing to version-controlled deployment — enabling security teams to build, test, and continuously deploy high-fidelity detectors at scale with comprehensive audit trails and change control.
Read the white paper → (opens in new tab)Active contributor to the SigmaHQ open-source detection rule project — the industry standard for platform-agnostic detection signatures.
Maintainer of CelesTLSH, an open-source TLSH fuzzy-hash datafeed tracking red teaming and penetration testing tools. Unlike traditional cryptographic hashes, TLSH (Trend Micro Locality Sensitive Hash) measures file similarity — enabling detection of modified, repackaged, or derivative tool variants that evade exact-match signatures.
Continuously updated from official GitHub repositories, supporting threat hunting, detection engineering, and incident response workflows.
View on GitHub → (opens in new tab)Mythos is finding thousands of vulnerabilities. Defenders aren't doomed. Detection has never been 1:1 with exploits, and why I think the numbers are a little* less scary than being made out to be.
From individual incident response to tracking adversaries across campaigns. Activity threading, analytic pivoting, and turning your own incidents into detection opportunities and structured threat intelligence.
The EDR Telemetry Project's website tells visitors to "validate detection logic" and endorses its use for guiding procurement decisions. The disclaimers saying it shouldn't be used for that exist only on GitHub. Public feedback suggesting it be clarified it can't be used for detection were ignored.
A.I. insanity has reached no heights. As vendors scream about AI super threats while the reality is boring.