Skip to content
View Josperdo's full-sized avatar

Block or report Josperdo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
josperdo/README.md

John Sperry

Cloud Security | Detection Engineering | Infrastructure

GRC and IT background expanding into cloud security, threat detection, and building tools for infrastructure visibility (including the occasional offensive security tool).

Current Focus

  • 🔨 Multi-cloud SOC labs across AWS and Azure
  • 🔨 Detection rules and network monitoring tools

Skills

Cloud & Infrastructure

Azure AWS Terraform Docker

Languages & Query

Python Bash PowerShell JavaScript KQL Go

Certifications

Security+ CySA+ PenTest+ CASP+ AZ-104

Philosophy

I gravitate toward tools that are easy to deploy, require minimal ongoing maintenance, and don't need significant infrastructure to operate. Security visibility shouldn't require a platform team to run.

Connect

Open to roles, consulting, and collaboration on cloud security and infrastructure.

Pinned Loading

  1. cloud-soc-terraform cloud-soc-terraform Public

    Terraform SOC lab for Azure or AWS - Sentinel detections, GuardDuty, hardened compute, and DevSecOps CI/CD.

    HCL

  2. soc-lab-docker soc-lab-docker Public

    Open-source security operations center (SOC) lab environment designed for defenders, detection engineers, and security analysts to learn and practice blue team tradecraft in a controlled, reproduci…

    Shell

  3. scanlyne scanlyne Public

    Network change detection with security context. Scanlyne runs nmap scans, stores the results, and shows you what changed between snapshots.

    Python