Open to opportunities

Andrew Hogan

Cybersecurity Engineer & U.S. Military Veteran

Security Operations Administrator @ Peraton · TS/SCI CI Poly · CISSP · SecurityX+

Andrew Hogan

Defending What Matters

Cybersecurity Engineer with 9+ years of experience engineering and securing cloud, on-prem, and hybrid environments. I specialize in Microsoft Sentinel, Defender XDR, Azure security, threat hunting, and incident response — with a strong background in security automation, SIEM/XDR engineering, and NIST RMF-aligned control implementation.

Currently serving as a Security Operations Administrator at Peraton, supporting mission-critical SOC operations with an active TS/SCI clearance with CI Polygraph and active DHS Public Trust. Founder of C3 Security and pursuing a B.S. in Cybersecurity at WGU (expected 2026).

9+Years Experience
15+Certifications
TS/SCICI Poly Clearance

Work Experience

Security Operations Administrator
Peraton
Apr 2025 — Present Current
  • Monitor, analyze, and respond to network, infrastructure, and information security incidents, improving handling efficiency and response consistency
  • Engineer continuous monitoring workflows across datacenter, network, and cloud environments aligned to NIST and MITRE ATT&CK frameworks
  • Coordinate incident response and escalation with SOC analysts, Incident Managers, and cross-functional teams to meet contractual SLA requirements
  • Produce operational reports and leadership briefings supporting proactive risk management and cybersecurity compliance obligations
SOC OperationsNISTMITRE ATT&CKIncident ResponseFederalTS/SCI
Information Security Analyst
BayForce
Feb 2025 — Jul 2025
  • Assessed and hardened Azure, Microsoft 365 Defender, Proofpoint, and Cisco Meraki configurations to enforce security controls and ensure compliance
  • Engineered risk reduction across AI, SaaS, OT, manufacturing, and IoT environments through vulnerability assessments and isolation strategies
  • Conducted NIST-aligned risk assessments, log forensics, and incident response analysis to detect, contain, and mitigate security incidents
  • Supported audits, vendor SaaS reviews, and governance activities by developing KPIs and embedding risk management into business decisions
AzureM365 DefenderProofpointCisco MerakiNISTRisk Assessment
Security Operations Center Analyst
Augusta University — Augusta, GA
May 2024 — Sep 2024
  • Monitored and investigated alerts using Microsoft Sentinel, Defender XDR, and Cisco Secure Endpoint, reducing average incident response time by 20%
  • Conducted endpoint threat investigations — analyzing device timelines, processes, and user activity to identify and contain malicious behavior
  • Developed and tuned Sentinel workbooks, analytic rules, and automated playbooks to enhance detection coverage and response consistency
  • Performed KQL-based log analysis across Azure security data sources to identify IoCs and mitigate 50+ potential threats
Microsoft SentinelDefender XDRKQLCisco Secure EndpointSOC Analysis
Cyber Operations Specialist
Army Cyber Command — Fort Eisenhower, GA
Dec 2021 — Sep 2024 U.S. Army
  • Conducted proactive threat hunting using Microsoft Defender XDR with digital forensics and malware analysis, increasing early threat detection by 30%
  • Implemented and maintained Microsoft Sentinel and IDS platforms, improving detection coverage and alert fidelity by 40%
  • Correlated security events across DoD systems to identify complex attack patterns associated with state-sponsored threat actors
  • Led annual security control self-assessments aligned to CND policies, achieving 100% compliance across all monitored systems
Defender XDRMicrosoft SentinelThreat HuntingDFIRMalware AnalysisDoD
Senior Information Technology Specialist
US Central Command — Camp Arifjan, Kuwait
Dec 2019 — Dec 2021 U.S. Army
  • Established and led an OPSEC program to address compliance gaps, achieving 100% pass rate on all operations security inspections
  • Investigated and resolved 200+ security incidents using Splunk, Tenable, Microsoft Sentinel, and Defender to maintain system integrity
  • Automated security operations and response workflows using PowerShell, BASH, and Python to improve efficiency and scalability
  • Led STIG implementation and vulnerability remediation, reducing system vulnerabilities by 40%
SplunkTenableOPSECSTIGsPowerShellPython
Helpdesk Manager
Army NETCOM — Fort Lewis, WA
Nov 2016 — Dec 2019 U.S. Army
  • Led secure IT support operations for 1,000+ users, enforcing security protocols, access controls, and data protection measures
  • Managed and mentored a team of 10 help desk technicians, improving team efficiency by 25%
  • Delivered security awareness and training programs that reduced user-error-driven security incidents by 50%
IT OperationsSecurity AwarenessWindowsTeam LeadershipVeteran

Technical Expertise

Security Tools

Microsoft Sentinel Defender XDR Defender for Endpoint Cisco Secure Endpoint Splunk ACAS / Nessus Qualys Claroty ProofPoint Zscaler AnyRun VirusTotal Cisco Meraki

Cloud Platforms

Microsoft Azure AWS Google Cloud Platform Microsoft 365 SharePoint

Scripting & Automation

PowerShell Python Bash KQL SQL Terraform Ansible

Frameworks & Compliance

MITRE ATT&CK Cyber Kill Chain NIST 800-53 NIST CSF RMF Zero Trust CMMC FedRAMP HIPAA FISMA PCI DSS SOC 2 ISO 27001 GDPR

Infrastructure & OS

Windows Server Linux (Ubuntu, Kali, RedHat) macOS Proxmox VMware LAN / WAN / VPN Switches / Routers

Ticketing & Software

ServiceNow Remedy Freshworks Jira Google Workspace VMware

Core Competencies

SIEM / SOC Engineering Incident Response Threat Hunting Vulnerability Management Risk Assessment Digital Forensics Security Automation Leadership

Credentials

Get In Touch

Open to full-time roles, consulting engagements, and security partnerships.