SecurityQ | Cybersecurity Engineer & Threat Hunter

AI-powered defense • DFIR • Purple Teaming • Proxmox & Azure Lab • Ransomware Reverse Engineering

About

I'm Quenton (“SecurityQ”), a Cybersecurity Engineer & Threat Hunter focused on threat-informed, AI-driven defense. I build hands-on labs (Proxmox, Security Onion, Wazuh), automate investigations with Python, and connect signals across logs, memory, and network telemetry to reduce time-to-detect and time-to-contain.

Core Skills

Threat Hunting

Hypothesis-driven hunts using ATT&CK, Sigma, KQL, and Zeek/Suricata artifacts.

DFIR & Automation

Python tooling for IOC triage, timeline building, and evidence packaging.

Cloud & Identity

Microsoft 365/XDR, Entra ID P2, Conditional Access, Defender for Cloud.

AI for Security

LLM-assisted playbooks, CUDA-accelerated workloads, model guardrails.

Featured Projects

SilentQ DFIR

Automated evidence collector & timeline builder. Packages artifacts for legal submission with hash manifests.

Python • KQL • Sigma • Timeline

GitHub

AI GuardRail Lab

Hands-on environment to test LLM prompt-injection defenses, OSINT enrichment, and policy-based red teaming.

Supabase • Next.js • OpenAI

GitHub

Home SOC

Proxmox + Security Onion + Wazuh with SPAN VLANs, GPU-assisted inference, and daily threat reports.

Proxmox • Zeek/Suricata • ELK

GitHub

Resume

Grab a PDF version or view highlights below.

Download PDF

Contact

For opportunities, collaborations, or speaking requests:

Email Me