Senior Threat Detection Engineer & Security Data Platform Architect
Building enterprise-scale security data platforms using data lakehouse architecture. Architecting ETL pipelines, detection analytics with PySpark and SQL, and ML-driven threat detection. Previously built detection engineering programs for multiple clients and architected complete corporate security stacks in FedRAMP environments.
Building an enterprise-scale security data platform using data lakehouse architecture to transform detection engineering capabilities. Owning the complete ETL pipeline for multi-source data ingestion and implementing detection analytics using PySpark and SQL with integrated ML capabilities for advanced threat detection.
Forward-deployed detection engineer embedded within client environments to mature detection engineering programs from the ground up. Established structured detection lifecycle frameworks enabling scalable content development and continuous improvement.
First security team member at Epirus, architecting the entire corporate security program from zero to production. Built automation-driven security foundations for a fast-growing defense technology startup while supporting FedRAMP compliance efforts.
My focus is on building scalable security data platforms that empower organizations to detect and respond to threats more effectively. By leveraging data lakehouse architecture, advanced ETL pipelines, and machine learning capabilities, I aim to create detection engineering programs that scale with organizational growth while maintaining high fidelity and operational efficiency. I'm particularly passionate about bridging the gap between security operations and data engineering, enabling teams to harness the full potential of their security telemetry through automation, analytics, and ML-driven insights.
Leveraging SigmAIQ to convert Sigma rules to any supported SIEM language, enabling detection-as-code practices across multiple platforms. Standardizing detection logic for vendor-agnostic threat detection at scale.
View Project →Automated threat intelligence enrichment using VirusTotal APIs to classify URLs and domains across 70+ security engines. Categorizing threats as undetected, harmless, or malicious for rapid IOC validation.
View Project →Built a comprehensive detection environment using DetectionLab to validate TTPs through Atomic Red Team simulations. Integrated Splunk, osquery, Windows Event Forwarder, and Sysmon for full-spectrum detection testing and tuning.
Developed a machine learning model using linear regression and multinomial naive bayes to predict malicious URLs. Trained on 60K samples with count vectorizer and tfidf-vectorizer, visualized analytics using seaborn and matplotlib.
View Project →