Timothy Corrado (Timmy)
SaaS Security Operations • Cloud SOC • Identity-First Defense • SIEM Triage • Security Automation • Security+
Open to SaaS Security (SOC / Security Ops / Cloud Security) roles

Security+ certified cybersecurity analyst focused on SaaS security operations: identity-driven investigations, SIEM triage, and automation that produces clean, repeatable security artifacts. Hands-on labs across Windows/Sysmon telemetry, network segmentation, and identity attack surface analysis. Strong documentation habits and customer-safe communication for incident timelines and remediation guidance.

SaaS Incident Triage
Identity & Access Risk
SIEM Workflows
Detection Logic
GitHub Actions (CI)
Python Automation
Least Privilege
Azure Fundamentals (AZ-900)
Featured Work (SaaS Security Ops)
Identity Attack Surface Analysis
Identity / Cloud
Built automation to enumerate identity exposure and simulate adversarial reconnaissance — relevant to SaaS identity compromise scenarios.
  • Enumerates identity signals (accounts, aliases, exposure vectors) and outputs structured findings.
  • Documents risks and remediation steps suitable for internal tickets and customer-facing notes.
  • Supports identity-first investigations (credential exposure, account takeover pathways).
Identity
Recon
Reporting
Python
Mini SOC Detection Lab (Auth Anomalies)
SIEM / Detection
Built SOC-style triage workflows using Windows/Sysmon telemetry to investigate authentication and host activity patterns.
  • Analyzed Windows Event IDs (4624/4625) and Sysmon signals to identify suspicious auth behavior.
  • Mapped detections to MITRE ATT&CK and produced repeatable investigation write-ups.
  • Designed output for escalation-ready handoffs (what happened, evidence, next actions).
Wazuh
Sysmon
Triage
MITRE
Security Automation Pipeline (Daily SOC Runs)
Automation / DevSecOps
Implemented CI-driven daily security runs that generate SOC-style artifacts (useful for SaaS environments where repeatability matters).
  • GitHub Actions workflow produces daily validation reports and structured logs.
  • Includes lightweight secret-scanning patterns and automated checks.
  • Demonstrates operational ownership and reliable security documentation.
GitHub Actions
CI Security
Reports
Automation
pfSense Firewall & Segmentation Lab
Network Controls
Built least-privilege network enforcement and segmentation — aligned with SaaS production principles (restrict, monitor, validate).
  • Removed default permissive rules; created explicit allow rules and validated enforcement via logs.
  • Segmented zones and verified blocked lateral movement paths.
  • Produced repeatable test cases for allow/deny validation.
pfSense
Least Privilege
Segmentation
Logging
Contact