Skip to content
View mrjmriii's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report mrjmriii

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mrjmriii/README.md

MRJMriii

Security operations portfolio

Portfolio snapshot

  • American security builder focused on resilient, validation-first systems
  • Target roles: Security Engineer, Junior Security Architect, DevSecOps Generalist
  • Design intent: scalable from small business to enterprise without changing core control objectives
  • Delivery focus: reproducible automation, clear rollback paths, and evidence-backed operations

Pinned work

What I build

Area Focus Outcome
Identity Auth, directory services, PKI/TLS Trust anchors and least-privilege access
Segmentation Zones, routing, exposure control Safe service boundaries and failover
Telemetry SIEM, case mgmt, intel flow High-fidelity signals and response loops
Validation Drills, RTO/RPO, evidence Measurable resilience and auditability

Operating model

signal_path = design -> automate -> validate -> evidence
posture     = safety_first, minimal_diffs, reproducible_runs

Portfolio principles

  • Documentation is a control surface, not just a reference
  • Automation is paired with validation hooks and rollback guidance
  • Lab-only offensive postures stay isolated and reversible

Contact

  • Open to collaboration and security engineering roles
  • Prefer GitHub issues or contact by request

Pinned Loading

  1. security-ops-blueprint security-ops-blueprint Public

    Sanitized, public-safe snapshot of a homelab IaC + SOC lab. Secrets and internal IPs/hostnames are redacted and replaced with RFC5737 examples. Adds high-signal docs, comments, and runbooks to expl…

    Shell

  2. purple-team-certification-lab purple-team-certification-lab Public

    Purple Team Certification Lab is a phase-driven adversary emulation framework aligned to a MITRE ATT&CK kill-chain view. It uses realistic scripts to generate observable telemetry and validate Wazu…

    Python