About me
Security analyst with 3 years of experience defending environments, investigating alerts and managing incidents. Currently transitioning to Red Team through laboratories, courses and practical certifications; I apply offensive techniques to identify gaps, validate controls and improve detection.
Key skills
- Detection and analysis:: triage of alerts and use of SIEM (Splunk/ELK).
- Incident response: containment, remediation and coordination with stakeholders.
- Hunting and forensics: analysis on endpoints and networks; extraction of IOCs.
- Tools and scripting: Splunk, Sysmon, EDRs, Wireshark; Python and Bash.
- Offensive fundamentals: pentesting and Red Team techniques: post-exploitation, lateral movement and persistence.
- Communication: actionable reports and reproducible documentation.
Achievements and focus
- Daily operation in CSIRT resolving real incidents and improving detections.
- Practical training and certifications aimed at Red Team.
- Pragmatic approach: reproducible, automated and measurable solutions.
What I can bring to a Cybersecurity Team
- Dual perspective from SOC and security operations to design and execute realistic and risk-aligned assessments.
- Design and implementation of TTP-based scenarios (e.g., MITRE ATT&CK) to evaluate controls, validate detections, and strengthen security posture.
- Ability to translate technical findings into prioritized, measurable, and outcome-oriented actions to drive continuous improvement.
Do you want to see write-ups or laboratories? Ask me for them and I will share them with you upon request.
Certifications
Cybersecurity, Ethical Hacking & Cloud
UpgradeHub · march. 2023
Forensic Analysis
UNED · currently
Dante Pro Lab
Hack The Box · may. 2025
eJPT
INE Security · sept. 2024
CEHPT
CyberLand Sec · feb. 2025
Splunk - What is Splunk
Splunk · mar. 2024
Splunk - Using Fields
Splunk · mar. 2024
Cybersecurity Essentials
Cisco · ene. 2023
Practical Linux Malware Development
EC-Council · may. 2025
Análisis de Malware
Udemy · nov. 2023
Introduction to Ethical Hacking
Entelgy by Accenture · may. 2024
EHE
EC-Council · may. 2023
Advanced Machine Learning using Python
CEINPRO · mar. 2023
Python Essentials 1
Cisco · ene. 2023
Cloud Digital Leader
Google · dic. 2022
NSE 1
Fortinet · nov. 2022
Scrum Foundation (SFPC)
CertiProf · ene. 2023
Curriculum
Projects
Binary parser for interactive USER_PROCESS events from wtmp artifacts. Supports filtering, epoch correlation and JSON export for incident response workflows.
python3 epochalysis.py /var/log/wtmp -u root --json
WriteUps
HTB – MonitorsFour
API token bypass (PHP type juggling) → user hash dump → password cracking → Cacti authenticated RCE → container access → Docker API abuse → filesystem mount → Administrator flag.
Writeup available
HTB – Wingdata
Anonymous FTP → Hash Cracking → WingFTP RCE (CVE-2025-47812) → tarfile Hardlink Bypass (CVE-2025-4517)
(protected until the machine is released)
HTB – Facts
Camaleon CMS mass-assignment → Filesystem settings credential disclosure → S3 internal bucket dump → SSH key recovery → sudo facter custom fact → root
(protected until the machine is released)
HTB – CCTV
ZoneMinder time-based blind SQL injection → database dump →
password cracking → SSH access as mark →
abuse of Motion API configuration → command injection → root.
(protected until the machine is released)