Skip to content
View ThreatHunterSec's full-sized avatar

Block or report ThreatHunterSec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ThreatHunterSec/README.md

Tetris contributions

🛡️ Senior Cloud & Security Engineer (IAM | DevSecOps | AppSec)

I am a Senior Cloud & Security Engineer and Blue Team Analyst with over 9 years of experience in architecting, engineering, and automating resilient cybersecurity programs across multi-cloud environments (Azure, GCP, AWS, OCI). My approach is focused on aligning robust security controls with business agility and measurable results.


🎯 Core Expertise & Engineering Focus

My expertise centers on leading and implementing complex security solutions:

Identity & Access Management (IAM/IGA/PAM)

  • Privileged Access Management (PAM): Architecting and managing high-risk environments using BeyondTrust solutions.
  • Identity Governance (IGA): Implementing and optimizing enterprise IGA systems like SailPoint and Microsoft Entra ID.
  • Identity Providers (IdP): Deep proficiency in Okta and Keycloak for SSO, federation, and centralized access control.

DevSecOps & Application Security (AppSec)

  • Security Integration: Embedding security early in the SDLC using SAST/DAST and GitHub Advanced Security in CI/CD pipelines.
  • Infrastructure as Code (IaC): Automating secure provisioning and hardening of cloud resources with Terraform, Bash and PowerShell.
  • Container Security: Expertise in securing Kubernetes/EKS workloads using Calico (eBPF and Network Policy enforcement).

AI/ML for Cyber Defense (Blue Team)

  • AI Security Engineering: Currently focused on leveraging Generative AI concepts (RAG, Fine-Tuning) and AI Vector Search for threat intelligence and security anomaly detection.
  • Incident Response & Automation (SOAR): Designing and implementing SIEM/SOAR solutions (Sentinel, Wazuh, Shuffle) to automate detection and response playbooks.

Currently Working On...

  • Secure Data Engineering Pipeline: Engineering end-to-end security and Data Governance for critical data pipelines, focusing on encryption, DLP (Purview), and robust IAM across data lakes.
  • AWS & CySA+ Roadmap: Actively pursuing the AWS Solutions Architect Associate and CompTIA CySA+ certifications to validate advanced cloud architecture and defensive security analysis skills.
  • AI-Powered Blue Team: Building ML models and automation workflows for proactive threat prioritization and optimizing SOAR efficiency.

I am open to: New challenges as a Security Engineer or Architect focusing on IAM/PAM, DevSecOps, or applying Data/AI Engineering to enhance Cyber Defense operations.


Key Achievements & Results (Based on Experience)

  • Vulnerability Management: Coordinated vulnerability management in hybrid environments (Azure, GCP e AWS), ensuring alignment with CIS Controls v8.
  • Operational Efficiency: Automated Disaster Recovery (DR) and secure infrastructure provisioning with IaC, leading to 40% reduction in repetitive task execution time and 30% increase in proactive anomaly detection (as Analyst).
  • Compliance: Ensured continuous compliance with major standards, including ISO 27001, LGPD, and PCI-DSS across complex IT landscapes.

Selected Certifications & Specializations

To improve scannability, here are the most relevant certifications grouped by domain:

Cloud & Infrastructure Security

  • Oracle Cloud Infrastructure | Architect Certified
  • Microsoft Certified | Azure Fundamentals / 365 Fundamentals
  • Certified Calico Operator | AWS Expert (Kubernetes/EKS Security)
  • Aviatrix | Multicloud Network Associate
  • Certified Calico Operator | eBPF

Identity, Access & Governance

  • SailPoint | Identity Security Leader (IGA)
  • BeyondTrust Certified Administrator/Engineer (PAM)
  • Microsoft Certified | Security, Compliance, and Identity Fundamentals
  • GitHub Certified | Advanced Security

AI, Data & Blue Team

  • Databricks | AI Security Fundamentals
  • Oracle Certified Professional | Generative AI / AI Vector Search
  • MongoDB | Building RAG Apps
  • Cyber Threat Intelligence Analyst | CTI
  • Snowflake | SnowPro Associate

Popular repositories Loading

  1. Amigo-Secreto Amigo-Secreto Public

    Desafio - Oracle Next Education

    CSS 1 1

  2. Python Python Public

  3. ThreatHunterSec ThreatHunterSec Public

    Python

  4. IPED IPED Public

    Forked from sepinf-inc/IPED

    IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation b…

    Java

  5. fortigate-terraform-deploy fortigate-terraform-deploy Public

    Forked from fortinet/fortigate-terraform-deploy

    Deployment templates for FortiGate-VM on cloud platforms with terraform

    HCL

  6. Mr.Holmes Mr.Holmes Public

    Forked from Lucksi/Mr.Holmes

    A Complete Osint Tool 🔍

    Python