[ Cloud Security ]

Darrin Miller

Aspiring Cloud Security Engineer

Washington, DC | darrinmiller07@gmail.com | (901) 343-3342 | LinkedIn | GitHub |
Copied!

01 Summary

Aspiring cybersecurity professional with a solid foundation in cybersecurity, information technology, and computer science. Capable of collaborating with cross-functional teams, delivering actionable security solutions, and demonstrating a commitment to continuous learning and professional development.

02 Certifications

03 Education

B.S. Computer Science — Oregon State University
Expected June 2026
B.S. Biology — Hampton University
2018

04 Technical Skills

Cloud
AWS S3 IAM CloudFront Lambda DynamoDB CloudTrail KMS CloudFormation
Languages
Python C PowerShell NodeJS
Security Tools
Splunk Wireshark Volatility Autopsy KAPE FTK Imager PhishTool
Network
IDS/IPS Firewalls Network Security
Databases
MySQL DynamoDB

05 Experience

Security Operations Specialist
Inter-Con Security
Nov 2024 – Present
  • Conducted proactive surveillance and security audits to identify potential vulnerabilities in physical and digital security protocols.
  • Assisted in documenting and escalating security incidents, ensuring proper reporting and mitigation strategies aligned with cybersecurity best practices.
  • Managed and enforced security policies for restricted areas and sensitive data access, aligning with zero-trust principles.
  • Utilized security monitoring tools to support situational awareness, aiding in real-time decision-making for threat mitigation.

06 Projects

AWS Cloud Security Portfolio
S3 Lambda CloudFormation IAM
  • Designing and deploying a serverless resume platform on AWS (S3, CloudFront, Lambda, DynamoDB, API Gateway) secured with least-privilege IAM policies, KMS encryption, and CloudTrail audit logging.
  • Implementing full CloudFormation Infrastructure as Code and GitHub Actions CI/CD pipeline.
Open Source Contribution — VAZlabs/cyber-find
Python Docker pytest
  • Authored two merged pull requests to an active open source cybersecurity OSINT tool (59 GitHub stars).
  • PR #41: Wrote parametrized Python unit tests for normalize_username() covering 6 edge cases — whitespace, mixed-case, unicode, 10k-char input, empty string, and None handling.
  • PR #47: Implemented Dockerfile and docker-compose.yml, resolved a Tkinter slim-image dependency bug, and documented Docker usage in the README.
Incident Handling & Splunk SIEM Integration
Splunk
  • Mapped attacker activities across all 7 Cyber Kill Chain phases using Splunk searches to facilitate faster detection and response.
  • Deconstructed a website defacement incident through log correlation and anomaly detection across wineventlog, winRegistry, and fortigate_utm sources.
Memory Analysis with Volatility
Volatility
  • Conducted in-depth memory forensics to extract critical artifacts and support incident response efforts.
  • Pinpointed and documented key memory artifacts, improving incident preparedness and cybersecurity posture.
Network Investigations Using Wireshark
Wireshark
  • Dissected network traffic to identify anomalies and uncover hidden vulnerabilities, producing actionable security reports.
Data Acquisition Lab
KAPE FTK Imager
  • Engineered a Data Acquisition Lab using KAPE, FTK Imager, and ProcDump to preserve and prepare digital evidence for forensic analysis.