> Security Engineer & Consultant
L3 Cybersecurity Consultant with 6+ years across security engineering, incident response, SOC operations, network security, penetration testing, and security governance. I build things that make analysts faster, defenses smarter, and organizations harder to breach — and I ship open source tools to prove it.
Where I operate, build, and defend across the full security lifecycle.
Designing SIEM detection rules, Sigma rules, and threat detection logic aligned with MITRE ATT&CK framework.
Incident response, malware triage, forensic analysis, and IOC investigations across enterprise environments.
Security control mapping, NIST CSF alignment, and security maturity improvements for organizations.
SOC tooling, Python automation, API integrations, and SOAR playbooks for operational efficiency.
OWASP Top 10 testing, vulnerability exploitation, and adversary simulation using Caldera and Metasploit.
6+ years building and defending enterprise security capabilities across MSSP, enterprise, and consulting environments.
Hands-on experience across the full security toolchain — from SIEM and EDR to offensive security and cloud.
Tools built to solve real SOC problems — production-deployed, open source.
Web-based threat intelligence platform aggregating IOC data from VirusTotal, AbuseIPDB, URLScan, and WHOIS. Supports IP, domain, URL, and hash analysis with auto-detection, bulk scanning, threat scoring, and CSV export. Deployed via Cloudflare Workers.
Single-file phishing email analyzer that runs entirely in your browser. Paste a raw email or drop a .eml file — it checks SPF, DKIM, DMARC, HTML body threats, URL lookalikes, attachment risk, and evasion techniques. Extracts IOCs and sends them straight to ThreatAnalyzer for bulk enrichment. No install, no server, no data leaving your machine.
SOC analyst utility for translating and normalizing IOC formats across different SIEM and threat intelligence platforms. Reduces manual copy-paste work during investigations and alert triage.
Automated bulk IP reputation checker that queries threat intelligence APIs at scale. Processes lists of IPs and outputs structured reputation reports for triage.
SOC analysts waste hours manually querying VirusTotal, AbuseIPDB, and URLScan one tab at a time. Copy-pasting IOCs, switching contexts, trying to correlate fragmented results.
A production-grade threat intelligence platform that queries 6 intel sources simultaneously, auto-detects IOC types, scores risk, and returns a unified investigation report in seconds instead of minutes.
During incident response engagements I noticed analysts spending 15-20 minutes per IOC manually checking each intelligence source. Multiply that by dozens of indicators per incident and it becomes a real bottleneck.
I built ThreatAnalyzer to solve a workflow problem I lived every day, not as a tutorial exercise. Find the friction, design the fix, ship it.
Phishing investigations are repetitive. Check the headers, look up SPF, scan the URLs — 15 minutes gone before you've started. Drop in any email and get auth failures, lookalike URLs, credential-harvesting forms, and all extracted IOCs scored in seconds. Nothing leaves your browser.
Dear valued customer,
We detected unusual activity on your account. Your access will be suspended within 24 hours unless you verify immediately.
Click here to verify: https://paypa1.com/secure/login
This message contains a <form> with a <input type="password"> harvesting credentials.
Phishing triage gets repetitive fast. Every report turns into the same routine — check headers, look up SPF, open the HTML, scan URLs. It takes time, but most of it isn't real analysis. It's just process.
PhishGuard puts all of that in one place. Drop in an email and get a full breakdown in seconds — without jumping between tools or leaking sensitive emails to external APIs.
What It Checks
What colleagues and managers say about working alongside Kim.
Kim Santos stands out as a Cybersecurity Consultant with remarkable dedication, consistently investing time in studying emerging threats and solutions. He has made significant contributions to policy implementation and ISO/NIST certification efforts, ensuring compliance and strengthening organizational resilience. His involvement in collaborative and consultation projects, ranging from engineering-focused initiatives to small external engagements goes to show both his versatility and practical impact. With deep technical expertise and a proven record of advancing standards, Kim is recognized as a trusted and impactful professional in cybersecurity.
I highly recommend Kim Santos as an exceptional professional in the cybersecurity field. They bring a rare combination of deep technical expertise, strategic thinking, and a proactive mindset to every challenge they tackle. Kim consistently demonstrates a strong understanding of evolving threat landscapes, coupled with the ability to design and implement robust, scalable security solutions. Beyond their technical capabilities, Kim is a trusted collaborator who communicates complex security concepts with clarity and precision, making them invaluable to both technical and non-technical stakeholders. Their commitment to staying ahead of emerging risks, along with their integrity and attention to detail, sets them apart as a leader in the cybersecurity space. Any organization would greatly benefit from Kim's expertise, professionalism, and dedication to protecting critical systems and data.
I'm proud to see how far Kim has come since his time as a SOC Analyst. Even then, he stood out by making recommendations and creating automations that made our jobs easier. Despite being at a junior level, Kim showed strong ownership of his work and wasn't afraid to share his ideas or provide feedback. He consistently went beyond expectations. He was also a reliable team player—easy to work with, supportive, and always willing to contribute. Over time, I saw him grow in both confidence and capability, which makes his progression to a Security Engineer well deserved. I'm genuinely glad to see his growth, and I'm confident that Kim will continue to excel in whichever company he works for.
I'm so proud of Kim's achievement in the cyber security field. Remembering his early days in the field he was our SOC trainee, he was easy to teach and very willing to learn the crafts. He was also a team player back then. Seeing how far he's grown is a testament to his drive and dedication.
Whether you're building a SOC from scratch, responding to an active incident, or looking for someone who can turn technical findings into business decisions — I'd love to connect.