I’m David B. Cox, a Junior Cloud Pentester and Offensive Security Professional transitioning from healthcare IT into cloud security, detection engineering, SOC analysis, and AI red teaming.
I build tools, break cloud misconfigurations, hunt threats, automate workflows with AI, and document everything through hands-on labs across AWS, Azure, Splunk, HTB, THM, and CyberDefenders.
🌐 Portfolio: https://cloudpuncher.dev
⚙️ Current Track: Splunk Certified Cybersecurity Defense Analyst (SCCDA)
🧠 AI + Red Teaming: Local Ollama + Zettlr workflow
☁️ Focus: Cloud Misconfigurations · Detection Engineering · Offensive Cloud Security
- Splunk SIEM, SOAR & UBA (SCCDA certification path)
- AWS Cloud Security & Azure enterprise environments
- Offensive Security Certifications (eJPT → PNPT → OSCP)
- AI-Augmented Recon, LLM workflow automation & prompt engineering
- SOC + Vulnerability Management with Sentinel, Tenable, Azure VM Labs
- Writing Labs, Tools & Documentation through HTB, THM, CyberDefenders
- Josh Matador’s Azure Range: SOC, Sentinel, Nessus, Detection & Vulnerability Management
- Splunk Blue Team Academy: SOC investigations, detection rules, attack analysis
- TryHackMe SOC Level 1: SIEM, Threat Intel, IR Foundations
- HackTheBox Academy: Pentesting Fundamentals & Exploitation Labs
- CyberDefenders: KQL, Threat Hunting, Log Analysis & Detection Engineering
Role: Cybersecurity Analyst — Threat Intelligence & Vulnerability Management
Duration: July 2025 – Present
- Azure/Cloud-wide Vulnerability Management Program Implementation
- Automated VM remediations using PowerShell + Bash
- STIG/Hardening checks across Windows & Linux environments
- Built a Mini-SOC + Honeynet for hands-on SOC simulation
- Threat hunting with Sentinel, Defender, Splunk, and KQL
- Building detection rules and dashboards for brute-force, ransomware, malicious authentication anomalies
- Using Splunk UBA for behavioral detection research
- Achieved 100% reduction in critical vulnerabilities through automated remediation
- Conducted Tenable-driven vulnerability assessments + DISA STIG audits
- Created PowerShell reporting automation pipelines for VM lifecycle
- Built Sentinel dashboards + KQL detections for high-fidelity alerts
- Reduced brute-force login incidents by 100% through NSG/firewall tuning
- Developed AI-assisted investigation workflows using Zettlr + LLMs
- Mapped attacker behavior to Splunk detections (SSE + UBA)
Core Technologies: Splunk · Tenable.io · Microsoft Sentinel · Defender · PowerShell · Azure · KQL · STIG · Nessus · Linux · VMware
Cloud/Platforms: AWS · Azure · VMware · Kali
Languages/Scripting: Python · PowerShell · Bash
Security Tools: Splunk · Tenable.io · Burp Suite · Metasploit · Wireshark · Nmap
AI/Workflow Tools: Ollama · Zettlr · VS Code · Obsidian
🎓 Master’s in Cybersecurity Strategy & Information Management — George Washington University
☁️ ICCA (INE Certified Cloud Associate) · CC (ISC2 Certified in Cybersecurity)
🎯 In Progress (2025–2026): Splunk SCCDA · Sec+ · eJPT · PNPT · OSCP · AWS Cloud Practitioner
- Azure Vulnerability Management Program
- SOC Investigation Labs (Splunk + Sentinel)
- AI-Augmented Pentesting Toolkit (Ollama + Zettlr)
- Mini-SOC & Honeynet Simulation (LOG(N) Pacific)
- KQL Detection Engineering Notebooks
(More being added through your internship & ongoing labs.)
- Splunk SCCDA certification
- AWS Cloud Practitioner + eJPT
- Publishing Log(N) Pacific SOC & VM Projects to GitHub
- Developing Splunk detection stories & dashboards
- Continuing AI red team research: prompt injection, model evasion, jailbreaks
🌍 Portfolio: https://cloudpuncher.dev
💼 LinkedIn: https://linkedin.com/in/davidbrookscox
💻 GitHub: https://github.com/siestakeydbc
🐦 X / @dcpentester: https://x.com/dcpentester