tonk
tonk :)
cyber defense analyst
stay curious, fail forward.
about

My career has never followed a straight line... and that's exactly what makes me effective.

I spent nearly a decade as a professional musician within the Air Force Bands, performing in high-stakes environments where precision and adaptability weren't optional. That experience rewired how I think: recognizing patterns in noise, staying calm under pressure, and adjusting in real time. Turns out, those skills translate well to digital defense.

Today I work as both a Cyber Risk Management Engineer in the private sector and a Cyber Defense Analyst with the Air National Guard, with experience across vulnerability management, application security testing, threat hunting, and GRC. I approach every problem the same way I approached music: with curiosity, discipline, and a willingness to rethink what I thought I knew.

specialties: threat hunting · network security monitoring · detection engineering · vulnerability management · risk management

what i'm into
threat hunting paddleboarding network forensics MITRE ATT&CK detection engineering home lab tinkering dog-jogs to grab coffee cryptographic puzzles building tools that ship making things from scratch
projects
hunt reference live
An offline-first MITRE ATT&CK threat hunting reference. 343 indicators across 80 techniques, with paste-ready query syntax for Arkime, Kibana, and Suricata. Built for SOC analysts working in isolated environments.
hunt.6b74.dev
reveille
Discord bot generating AI-powered daily intel briefs from RSS feeds across military, geopolitical, intelligence, and cyber categories. Running 24/7 on Railway.
running on Railway
home network rebuild
Full home network overhaul with VLAN segmentation (Family / IoT / Guest / Gaming / Security). Protectli VP2420 running OPNsense, TP-Link managed switch, EAP670 Wi-Fi 6 AP, Beelink mini PC running Security Onion + Pi-hole. Zeek and Suricata feeding Elasticsearch + Kibana for full home network visibility.
running in the rack
connect