Bryan Miller

Vulnerability Management & Cybersecurity Analyst

I help reduce security risk through vulnerability management, secure configuration, remediation automation, and threat-focused investigation.

Security+B.S. Cybersecurity100% critical reduction

Evidence

Risk Reduction and Security Operations experience

A concise snapshot of resume-backed experience, security operations work, and measurable vulnerability reduction.

Remediation dashboard

Vulnerability Reduction Metrics

100%

Critical

92%

High

88%

Medium

Critical

100%

Findings2 -> 0

Critical vulnerabilities reduced for the server team

Reduction100%

High

92%

Findings12 -> 1

High vulnerabilities reduced for the server team

Reduction92%

Medium

88%

Findings17 -> 2

Medium vulnerabilities reduced for the server team

Reduction88%

Network security dashboard

Network Security Dashboard

Brute Force

Brute Force

100%

IncidentsReduced

Brute force incidents reduced through inbound NSG and firewall controls

Reduction100%

Education

Norwich University (NSA-Accredited College) Bachelor of Science in Cybersecurity Focus on: Computer Forensics & Vulnerability Management GPA 3.99 Summa Cum Laude

Certificates

CompTIA Security+ Verification ID: 83026b02794c46548b423e8bffc9d9e5

Experience

Vulnerability scanning, reporting, PowerShell-based remediation, Tenable, DISA STIG compliance, MDE/Sentinel threat hunting, detection rules, dashboards, and Azure NSG/firewall controls.

Security Impact Metrics

100% reduction in critical vulnerabilities 92% reduction in high vulnerabilities 88% reduction in medium vulnerabilities 100% reduction in brute force incidents through inbound NSG and firewall controls.

Featured Projects

Cybersecurity work organized for hiring review

Evidence-backed case studies covering vulnerability management, secure configuration, remediation automation, and threat hunting.

Scan Summary32 -> 4
Critical
100%High
92%Medium
88%

Vulnerability Management Analyst

Vulnerability Management Program Implementation

A simulated end-to-end vulnerability management program covering policy creation, stakeholder buy-in, authenticated scanning, prioritization, remediation, and verification.

Problem

No policy, scan approval, priority model, or verification loop existed.

Outcome

Findings fell from 32 to 4, with criticals eliminated.

Concepts

Governance, authenticated scanning, risk prioritization, and validation.

Tools

TenableAzure Cloud InfrastructureAzure Virtual MachinesPowerShellWindows Server
STIG ControlState

DISA STIG Audit

Complete

Remediation Scripts

Executed

STIG Remediation

Remediated

Security Analyst / Technical Compliance Analyst

DISA STIG Remediation Project

PowerShell Remediation Scripts and Screenshot-based validation evidence for selected Windows 11 DISA STIG findings in a lab environment.

Problem

Windows 11 STIG findings needed scripted fixes and validation proof.

Outcome

Selected controls are documented without claiming full compliance.

Concepts

Registry policy, audit policy, PowerShell checks, and evidence capture.

Tools

PowerShellDISA STIGWindows 11Windows Registryauditpolgpupdate
159.26.106.84
->
RDP
->
slflare
->
slflarewinsysmo
Fail
Fail
Fail
Success

SecOps Analyst / SOC Analyst / Threat Detection Analyst

Password Spray Threat Hunt: RDP Compromise Investigation

A Microsoft Defender and Sentinel-style threat hunt reconstructing a cyber-range Windows VM compromise from password-spray-driven RDP access through execution, persistence, evasion, C2, and attempted exfiltration.

Problem

RDP access after password spraying needed full endpoint pivots.

Outcome

The report reconstructs the attack path and attempted exfiltration.

Concepts

RDP logon analysis, KQL pivots, ATT&CK mapping, and exfil review.

Tools

Microsoft Defender for EndpointSentinel-style KQLMITRE ATT&CKWindows telemetry

AnyDesk

Staging

Evasion

Encryption

T1219T1074T1562T1486

Threat Hunter / SecOps Analyst

The Buyer / Akira Ransomware Threat Hunt

A cyber-range Akira ransomware investigation reconstructing remote access, staging, lateral movement, defense evasion, data staging, and impact artifacts using Microsoft Defender telemetry.

Problem

Akira activity needed host scoping, timeline rebuild, and gap review.

Outcome

Affected hosts, IOC timing, and detections are documented.

Concepts

Ransomware timeline, remote access triage, tampering, and impact.

Tools

MDE Advanced HuntingMicrosoft SentinelSIEMKQLMicrosoft Defender for EndpointMITRE ATT&CK