Threat Intelligence
End-to-end adversary tracking, threat hunting, and translating complex telemetry into direction for leaders and operators. Bridging the gap between raw data and strategic decision-making.
Senior Cyber Threat Analyst
Researcher working at the intersection of threat intelligence, artificial intelligence, information theory, and complex systems.
About
I am a Senior Cyber Threat Analyst with a Master of Science in Management of Information Systems (Cybersecurity) from Nova Southeastern University. Currently at EY, I work at the intersection of cyber threat detection and machine learning, exploring how intelligent systems can strengthen the way we identify, anticipate, and respond to adversarial behavior at scale. Previously, I held security roles at IBM, sharpening my approach to enterprise-scale detection and response.
Beyond the operational, my work extends into applied research. I study how ideas from information theory, network science, and complex systems can sharpen the way we detect, model, and respond to threats in an era increasingly shaped by AI. I have also taught courses in cybersecurity, Linux security, and game theory, grounding students in rigorous analytical thinking and the fundamentals that underpin it all.
Focus Areas
End-to-end adversary tracking, threat hunting, and translating complex telemetry into direction for leaders and operators. Bridging the gap between raw data and strategic decision-making.
Exploring how machine learning augments analysis while evaluating model trustworthiness, adversarial risks, and responsible adoption. Studying what changes when AI enters the decision loop.
Applying network science and information-theoretic measures to uncover hidden dependencies, model cascading failures, and strengthen resilience across socio-technical systems.
Publications
My research investigates how AI, network science, and information theory can strengthen the way we understand and defend complex digital environments.
Writing
Longer-form thinking on cybersecurity practice, AI adoption, compliance realities, and the systems-level dynamics that connect them.
Cybersecurity · Compliance
Why over 60% of compliance implementations remain paper exercises and what that means for OT environments.
LinkedIn Article
AI · Change Management
How security teams can navigate the friction between AI adoption velocity and institutional readiness.
LinkedIn Article
Security Operations
Observations on what separates functional security operations from well-funded ones that still miss things.
LinkedIn Article
Contact
Open to research collaboration, consulting engagements, and speaking opportunities in cybersecurity, AI, and complex systems.