~/packetpursuit $ whoami

Cybersecurity Researcher • Veteran • Threat Hunter

Combat veteran turned cybersecurity professional with a mission-first approach to defending digital infrastructure. Currently building threat intelligence platforms, hunting malware in honeynet deployments, and pursuing SOC analyst opportunities in critical infrastructure.

> Projects

Honeynet deployments, malware analysis, home lab infrastructure, and CTF walkthroughs.

cd ./projects →

> Blog

Field notes from the trenches — threat intel, analysis writeups, and automated feeds.

cat ./blog →

> Contact

Looking to connect? Grab my resume, send a message, or find me on LinkedIn.

ping jake@ →
[CVE-2024-3400] PAN-OS GlobalProtect Command Injection — Critical
[THREAT] Kinsing crypto miner variant detected in honeynet — Active Campaign
[CVE-2024-21887] Ivanti Connect Secure Auth Bypass — Actively Exploited
[MALWARE] Rondodox/Mirai variant — IoT botnet C2 traffic captured
[INTEL] APT29 spear-phishing campaign targeting energy sector — CISA Advisory
[CVE-2024-3400] PAN-OS GlobalProtect Command Injection — Critical
[THREAT] Kinsing crypto miner variant detected in honeynet — Active Campaign
[CVE-2024-21887] Ivanti Connect Secure Auth Bypass — Actively Exploited
[MALWARE] Rondodox/Mirai variant — IoT botnet C2 traffic captured
[INTEL] APT29 spear-phishing campaign targeting energy sector — CISA Advisory

> PacketBot_

Hey — I'm PacketBot. Ask me anything about Jake's background, projects, or how to get in touch.