TLDR:

My name is Kyle and I work as a senior cybersecurity analyst for a Fortune 20 organization. My focus pertains to offensive cybersecurity operations - specifically adversary emulation, purple teaming, and penetration testing. In my spare time you’ll find me reading, hunting, fishing, or watching sports.

📖 🦃 🎣 🏈 🏁

Long Version

My role offers me the opportunity to work with some incredibly smart people with the objective to drive security initiatives that directly impact the organization’s incident response procedures and perform functions that ultimately leads to an improved security posture, thus reducing risk to the organization.

The typical day as a cybersecurity Analyst varies a lot. Some responsibilities that I’m usually focused on (or have focused on) include:

Previously…

I used to work as a cybersecurity specialist for an Israeli cybersecurity training startup. I spent my day educating security professionals such as SOC analysts, cybersecurity analysts, incident responders, and threat hunters. I would coach them through **simulated incidents (such as ransomware infections) that used various malware strains in a virtual corporate network. The live incidents were centralized around defensive (blue team) or offensive (red team) operations. Topics would include networking, cryptography, forensics, intrusion detection, endpoint forensics, web application hacking, and much more. During training scenarios I would leverage my knowledge to help teams navigate enterprise tools such as Splunk, Palo Alto, Carbon Black EDR, and other open-source tools such as OWASP Zap.

Prior to my career in cybersecurity, I worked for a Fortune 500 financial services company as a financial advisor. As a CERTIFIED FINANCIAL PLANNER™ professional, I acted as a fiduciary that identified investment strategies for clients that best fit their goals.