Want top talent?

Derrick Horton

Cybersecurity analyst with expertise in SIEM technologies such as Microsoft Sentinel and Splunk for incident response and threat detection. Experienced in vulnerability management and log analysis using tools like Microsoft Defender and PowerShell scripting. Proven ability to accurately identify, triage, and mitigate threats while collaborating with SOC teams. Adept at applying MITRE ATT&CK and NIST guidelines to enhance overall security posture.

Education

Bachelor's of Science: Cybersecurity and Information Assurance

Western Governor's University

NSA/DHS-designated program emphasizing network defense, ethical hacking, forensics, and risk management aligned with federal cybersecurity standards.

Security Analyst

Abnormal AI

  • Detected and reported phishing threats and compromised vendor accounts, leveraging SIEM tools to support prompt incident response and threat analysis.
  • Investigated suspicious login attempts to analyze and mitigate potential malicious account takeovers, incorporating advanced threat hunting techniques.
  • Developed automation rules using scriping languages to enhance AI-based threat detection and streamline incident response workflows.

Customer Service Representative

Leading Edge Connections

  • Handled high-volume calls under pressure while triaging issues effectively and ensuring data confidentiality.
  • Followed protocols for safeguarding all sensitive customer information complying with HIPAA for PII and PHI.
  • Developed CI/CD and managed GitHub secrets for automated rapid and secure deployment of iOS and Android apps.
  • Designed and tested new features in response to customer feedback and assisted with integration into both brick-and-mortar retail and online stores.

Implementing a SOC and Honeynet in Azure

Home Lab

We’re looking for a Web Developer to build and maintain our websites. Your work will help create seamless online experiences for our users.

Vulnerability Management Program Implementation

Home Lab

As an HR Manager, you will oversee recruiting and employee relations. Your role will be crucial in shaping our company culture and supporting our staff.

Programmatic Vulnerability Remediations

Home Lab

As a Business Analyst, you will analyze data to inform business decisions. Your insights will help us streamline operations and improve our efficiency.

Threat Hunt Report: Unauthorized TOR Usage

Home Lab

As a Business Analyst, you will analyze data to inform business decisions. Your insights will help us streamline operations and improve our efficiency.

CySA+

CompTIA

Cyber Security Analyst – Proven ability to detect and analyze threats, respond to incidents, and strengthen security posture through vulnerability management and behavioral analytics. Skilled in leveraging SIEM tools, threat intelligence, and proactive defense strategies to reduce organizational risk.

PenTest+

CompTIA

Penetration Tester – Demonstrated expertise in penetration testing, vulnerability assessment, and exploitation techniques to identify and remediate security gaps. Skilled in performing network, application, and wireless testing, leveraging tools and methodologies to strengthen organizational defenses.

Security+

CompTIA

Security Practitioner – Proven ability to implement and manage core security controls, assess risk, and secure networks, applications, and systems. Skilled in access management, cryptography, incident response, and applying security best practices to meet organizational and compliance requirements.

SSCP

ISC2

Systems Security Certified Practitioner – Validates advanced technical skills in implementing, monitoring, and administering IT infrastructure using security best practices, policies, and procedures. Demonstrated ability in access controls, network security, incident response, and security operations to protect critical assets.

Network+

CompTIA

Network Technician – Demonstrated ability to design, configure, manage, and troubleshoot wired and wireless networks. Skilled in implementing secure network architectures, supporting virtualization and cloud connectivity, and ensuring reliable performance across enterprise environments.

CCSP Associate

ISC2

Certified Cloud Security Professional – Proven expertise in securing cloud environments through strong knowledge of cloud architecture, governance, compliance, and risk management. Skilled in implementing data protection, identity and access management, and threat defense strategies across multi-cloud and hybrid infrastructures.

Project+

CompTIA

Project Manager – Demonstrated ability to plan, manage, and deliver IT and business projects on time and within scope. Skilled in project lifecycle management, stakeholder communication, resource coordination, and risk mitigation to ensure successful outcomes.

A+

CompTIA

IT Support Specialist – Proven foundation in IT support, troubleshooting, and technical problem-solving across hardware, software, and networking. Skilled in diagnosing issues, securing endpoints, and providing effective technical solutions to maintain reliable business operations.

AZ-900

Microsoft

Azure Fundamentals – Demonstrated foundational knowledge of cloud concepts, core Azure services, security, compliance, and pricing. Skilled in understanding cloud workloads, governance, and basic cloud-based solutions to support IT and business objectives.

Google Cybersecurity Professional

Coursera

Cybersecurity Analyst – Completed comprehensive training in core cybersecurity concepts, including threat detection, risk management, network security, and incident response. Developed practical skills in securing systems, analyzing vulnerabilities, and applying security best practices to protect organizational assets.

ITIL 4 Foundation

PeopleCert

IT Service Management (ITSM) Practitioner – Demonstrated understanding of IT service management best practices, including service lifecycle, value streams, and continual improvement. Skilled in aligning IT services with business needs, optimizing processes, and enhancing service delivery across organizations.

Linux Essentials

Linux Professional Institute

Linux Administrator – Demonstrated foundational knowledge of Linux operating systems, including command-line usage, basic system administration, and open-source concepts. Skilled in managing files, processes, and user permissions, providing a solid foundation for Linux-based IT and cybersecurity environments.

Tools

Splunk, Microsoft Sentinel, Defender for Endpoint, Log Analytics, SIEM, IDS/IPS, Snort, WireShark, BurpSuite, GitHub

Scripting

Bash, SQL, Python, PowerShell, Linux Command Line, File Permissions

Frameworks

MITRE ATT&CK, NIST 800-61, NIST 800-144

Cybersecurity

Threat Detection, Incident Response, Vulnerability Assessment, Threat Hunting, PCAP Analysis, Malware Analysis, Digital Forensics

Cloud Security

AWS, Azure (AZ-500 Certified), Google Cloud, Virtual Networks, Access Control Lists

Networking

TCP/IP, DNS, VPNs, Network Troubleshooting, Firewalls, Active Directory

Soft Skills

Communication, Documentation, Collaboration, Analytical Thinking

Want to see more? Visit my Credly page.