Want top talent?
Derrick Horton
Cybersecurity analyst with expertise in SIEM technologies such as Microsoft Sentinel and Splunk for incident response and threat detection. Experienced in vulnerability management and log analysis using tools like Microsoft Defender and PowerShell scripting. Proven ability to accurately identify, triage, and mitigate threats while collaborating with SOC teams. Adept at applying MITRE ATT&CK and NIST guidelines to enhance overall security posture.
Education
Bachelor's of Science: Cybersecurity and Information Assurance
Western Governor's University
NSA/DHS-designated program emphasizing network defense, ethical hacking, forensics, and risk management aligned with federal cybersecurity standards.
Experience
Security Analyst
Abnormal AI
- Detected and reported phishing threats and compromised vendor accounts, leveraging SIEM tools to support prompt incident response and threat analysis.
- Investigated suspicious login attempts to analyze and mitigate potential malicious account takeovers, incorporating advanced threat hunting techniques.
- Developed automation rules using scriping languages to enhance AI-based threat detection and streamline incident response workflows.
Customer Service Representative
Leading Edge Connections
- Handled high-volume calls under pressure while triaging issues effectively and ensuring data confidentiality.
- Followed protocols for safeguarding all sensitive customer information complying with HIPAA for PII and PHI.
Owner
Anypay
- Developed CI/CD and managed GitHub secrets for automated rapid and secure deployment of iOS and Android apps.
- Designed and tested new features in response to customer feedback and assisted with integration into both brick-and-mortar retail and online stores.
Projects
Implementing a SOC and Honeynet in Azure
Home Lab
We’re looking for a Web Developer to build and maintain our websites. Your work will help create seamless online experiences for our users.
Vulnerability Management Program Implementation
Home Lab
As an HR Manager, you will oversee recruiting and employee relations. Your role will be crucial in shaping our company culture and supporting our staff.
Programmatic Vulnerability Remediations
Home Lab
As a Business Analyst, you will analyze data to inform business decisions. Your insights will help us streamline operations and improve our efficiency.
Threat Hunt Report: Unauthorized TOR Usage
Home Lab
As a Business Analyst, you will analyze data to inform business decisions. Your insights will help us streamline operations and improve our efficiency.
Certifications
CySA+
CompTIA
Cyber Security Analyst – Proven ability to detect and analyze threats, respond to incidents, and strengthen security posture through vulnerability management and behavioral analytics. Skilled in leveraging SIEM tools, threat intelligence, and proactive defense strategies to reduce organizational risk.
PenTest+
CompTIA
Penetration Tester – Demonstrated expertise in penetration testing, vulnerability assessment, and exploitation techniques to identify and remediate security gaps. Skilled in performing network, application, and wireless testing, leveraging tools and methodologies to strengthen organizational defenses.
Security+
CompTIA
Security Practitioner – Proven ability to implement and manage core security controls, assess risk, and secure networks, applications, and systems. Skilled in access management, cryptography, incident response, and applying security best practices to meet organizational and compliance requirements.
SSCP
ISC2
Systems Security Certified Practitioner – Validates advanced technical skills in implementing, monitoring, and administering IT infrastructure using security best practices, policies, and procedures. Demonstrated ability in access controls, network security, incident response, and security operations to protect critical assets.
Network+
CompTIA
Network Technician – Demonstrated ability to design, configure, manage, and troubleshoot wired and wireless networks. Skilled in implementing secure network architectures, supporting virtualization and cloud connectivity, and ensuring reliable performance across enterprise environments.
CCSP Associate
ISC2
Certified Cloud Security Professional – Proven expertise in securing cloud environments through strong knowledge of cloud architecture, governance, compliance, and risk management. Skilled in implementing data protection, identity and access management, and threat defense strategies across multi-cloud and hybrid infrastructures.
Project+
CompTIA
Project Manager – Demonstrated ability to plan, manage, and deliver IT and business projects on time and within scope. Skilled in project lifecycle management, stakeholder communication, resource coordination, and risk mitigation to ensure successful outcomes.
A+
CompTIA
IT Support Specialist – Proven foundation in IT support, troubleshooting, and technical problem-solving across hardware, software, and networking. Skilled in diagnosing issues, securing endpoints, and providing effective technical solutions to maintain reliable business operations.
AZ-900
Microsoft
Azure Fundamentals – Demonstrated foundational knowledge of cloud concepts, core Azure services, security, compliance, and pricing. Skilled in understanding cloud workloads, governance, and basic cloud-based solutions to support IT and business objectives.
Google Cybersecurity Professional
Coursera
Cybersecurity Analyst – Completed comprehensive training in core cybersecurity concepts, including threat detection, risk management, network security, and incident response. Developed practical skills in securing systems, analyzing vulnerabilities, and applying security best practices to protect organizational assets.
ITIL 4 Foundation
PeopleCert
IT Service Management (ITSM) Practitioner – Demonstrated understanding of IT service management best practices, including service lifecycle, value streams, and continual improvement. Skilled in aligning IT services with business needs, optimizing processes, and enhancing service delivery across organizations.
Linux Essentials
Linux Professional Institute
Linux Administrator – Demonstrated foundational knowledge of Linux operating systems, including command-line usage, basic system administration, and open-source concepts. Skilled in managing files, processes, and user permissions, providing a solid foundation for Linux-based IT and cybersecurity environments.
Skills
Tools
Splunk, Microsoft Sentinel, Defender for Endpoint, Log Analytics, SIEM, IDS/IPS, Snort, WireShark, BurpSuite, GitHub
Scripting
Bash, SQL, Python, PowerShell, Linux Command Line, File Permissions
Frameworks
MITRE ATT&CK, NIST 800-61, NIST 800-144
Cybersecurity
Threat Detection, Incident Response, Vulnerability Assessment, Threat Hunting, PCAP Analysis, Malware Analysis, Digital Forensics
Cloud Security
AWS, Azure (AZ-500 Certified), Google Cloud, Virtual Networks, Access Control Lists
Networking
TCP/IP, DNS, VPNs, Network Troubleshooting, Firewalls, Active Directory
Soft Skills
Communication, Documentation, Collaboration, Analytical Thinking
Want to see more? Visit my Credly page.