Cybersecurity Engineer

Jonathan
Soquerata

Cybersecurity engineer specializing in high-stakes defense across Endpoint, Email, and Network domains. I design, automate, and defend the systems that keep modern threats at bay.

I’ve spent the last 10 years working across endpoint, email, and network security. My goal is usually pretty simple: build security that actually works in production without breaking everyone’s workflow.


Lately, I’ve been leaning into Security as Code—using tools like Terraform and Ansible to automate defenses and move away from legacy manual setups.

10+
Years Professional Experience
300+
Global DMARC Implmentations
10+
Security Workflows Automated
2020 — 2026
Equinix
Information Security Engineer
I architect and automate resilient security ecosystems, recently leading the DMARC hardening of 300+ domains and a 15,000-user migration from an incumbent Secure Email Gateway to Microsoft Defender for Office 365. My work focuses on replacing manual workflows with automated integrations that cut SOC investigation times by 80% and drive massive operational savings.
EDR Email Security SPF/DKIM/DMARC SIEM Network Security Infrastructure-as-a-Code
2018 — 2020
E*TRADE
Senior Security Analyst
As a Senior Security Analyst, I stayed ahead of the curve by hunting for threats and handling incident response from start to finish. Beyond just managing alerts, I spent my time helping to tune our SIEM for better accuracy, building out our team's internal wiki, and mentoring junior analysts to help level up our SOC operations.
EDR IDS/IPS Incident Response SIEM Phishing
2016 — 2018
Macy's
Security Analyst
I handled the day-to-day work of spotting and responding to security threats across the entire enterprise. Most of my time was spent triaging potential incidents—investigating phishing attempts, malware, and rogue access points—and then deciding whether to escalate them or close them out after suggesting the right fix to mitigate the risk.
Phishing Incident Response SIEM
2013 — 2016
Hewlett-Packard Enterprise
Application Security Consultant
I ran security scans (DAST/SAST) for a wide range of clients, including some Fortune 500s, using tools like HP WebInspect and Fortify SCA. My job was to dig into the results to filter out the noise, manually validating vulnerabilities across everything from modern languages like Java and .NET to legacy COBOL systems, and then put together the final reports with clear recommendations on how to fix the vulnerabilities.
DAST SAST HP WebInspect HP Source Code Analyzer Burp Suite Manual Application Testing
2011 — 2013
SPi Global
Software Engineer
I kept the UNIX-based ETL system at Lexis-Nexis running smoothly, jumping in to make updates or fixes whenever QA found an issue. Most of my day was spent digging into why a job was delayed or why a production error happened, then getting those findings into a report. On the technical side, I was constantly in the weeds with Perl, XML, and IBM JCL to handle any necessary code changes, all while keeping everything tracked in WebStar.
Software Engineering Regular Expressions XML/XSLT UNIX IBM JCL(Job Control Language)
01
jsoquerata.com - Automated Cloud Infrastructure & DevSecOps Pipeline
Built and automated a full cloud infrastructure on AWS using Terraform and Ansible, with a GitHub Actions CI/CD pipeline embedding SAST (Checkov, Semgrep) and DAST (OWASP ZAP) at every deployment. Zero manual steps from code to production.
02
Crowdstrike Maintentance Token Recovery Tool
Built a Python desktop application with a GUI (Tkinter) using the CrowdStrike API to remotely retrieve maintenance tokens for endpoints no longer reporting to the Falcon console, eliminating manual intervention for the Endpoint team.
03
Network Segmentation Redesign
Redesigned a flat enterprise network into a zero-trust segmented architecture, reducing lateral movement potential and isolating critical assets.
04
Security Awareness Programme
Designed and ran a company-wide phishing simulation and training programme, achieving a 60% drop in click rates within six months.
Endpoint Security
  • EDR / XDR
  • CrowdStrike Falcon
  • Cylance
  • Hardening & CIS Benchmarks
  • Malware Analysis
Email & Network
  • Proofpoint
  • Microsoft EXO/MDO
  • SPF / DKIM / DMARC
  • Zscaler Private Access / Internet Security
  • Firewall & IDS/IPS
  • Zero Trust Architecture
  • VPN & Network Segmentation
Operations
  • Security Operations
  • SIEM (ELK, ArcSight)
  • Incident Response
  • Threat Intelligence
  • MITRE ATT&CK
  • Scripting (Python, Bash)
  • Infrastructure-as-a-Code
2024
GIAC Python Coder
GIAC/SANS SEC573
2016
EC-Council Certified Security Analyst
EC-Council
2015
Certified Ethical Hacker v9
EC-Council
2011
Bachelor of Science in Computer Science
Adamson University