SOC Advisory
Cogswell Award-winning SOC leadership. Build, mature, or transform your security operations.
Cybersecurity research, threat intelligence, and detection engineering.
Cogswell Award-winning SOC leadership. Build, mature, or transform your security operations.
Build and mature detection engineering and threat intelligence programs. Detection as Code from its original authors.
Breach detection for acquisitions and MDR/MSSP provider evaluation.
Custom tooling for MSSPs and XDR providers.
SOC manager for the security team at Corvid Technologies when the team was recognized with the 2021 James S. Cogswell Outstanding Industrial Security Achievement Award — the highest honor the Defense Counterintelligence and Security Agency (DCSA) bestows upon cleared industry, awarded to just 40 of approximately 13,000 cleared contractor facilities nationwide.
Previously built and managed SOC operations for a managed detection and response (MDR) provider across classified and unclassified programs, and established a security operations center for a regional internet service provider.
Authored the first publicly available white paper on the Detection as Code methodology (2019), defining a framework for applying CI/CD pipeline practices to security detection development. The paper introduced a full lifecycle approach — from detection engineering and automated testing to version-controlled deployment — enabling security teams to build, test, and continuously deploy high-fidelity detectors at scale with comprehensive audit trails and change control.
Read the white paper → (opens in new tab)Active contributor to the SigmaHQ open-source detection rule project — the industry standard for platform-agnostic detection signatures.
Maintainer of CelesTLSH, an open-source TLSH fuzzy-hash datafeed tracking red teaming and penetration testing tools. Unlike traditional cryptographic hashes, TLSH (Trend Micro Locality Sensitive Hash) measures file similarity — enabling detection of modified, repackaged, or derivative tool variants that evade exact-match signatures.
Continuously updated from official GitHub repositories, supporting threat hunting, detection engineering, and incident response workflows.
View on GitHub → (opens in new tab)The EDR Telemetry Project's website tells visitors to "validate detection logic" and endorses its use for guiding procurement decisions. The disclaimers saying it shouldn't be used for that exist only on GitHub. Public feedback suggesting it be clarified it can't be used for detection were ignored.
A.I. insanity has reached no heights. As vendors scream about AI super threats while the reality is boring.
Every detection can be evaded. So what's worse: missing an attack or drowning in noise? The Base-Rate Fallacy shows that false positives are the true limiting factor. The goal isn't to be perfect; it's to be a difficult target. Each layer that forces an adversary to adapt is a win.
A new paper questions fuzzy hashing, but real-world data tells a different story. I share practical lessons for reducing false positives and argue that the future of TLSH isn't in alerting, it's in enriching events to create high-fidelity detections.