Cybersecurity Engineer
Jonathan
Soquerata
Cybersecurity engineer specializing in high-stakes defense across Endpoint, Email, and Network domains. I design, automate, and defend the systems that keep modern threats at bay.
About
I’ve spent the last 10 years working across endpoint, email, and network security. My goal is usually pretty simple: build security that actually works in production without breaking everyone’s workflow.
Lately, I’ve been leaning into Security as Code—using tools like Terraform and Ansible to automate defenses and move away from legacy manual setups.
10+
Years Professional Experience
300+
Global DMARC Implmentations
10+
Security Workflows Automated
Experience
Information Security Engineer
I architect and automate resilient security ecosystems, recently leading the DMARC hardening of 300+ domains and a 15,000-user migration from an incumbent Secure Email Gateway to Microsoft Defender for Office 365. My work focuses on replacing manual workflows with automated integrations that cut SOC investigation times by 80% and drive massive operational savings.
Senior Security Analyst
As a Senior Security Analyst, I stayed ahead of the curve by hunting for threats and handling incident response from start to finish. Beyond just managing alerts, I spent my time helping to tune our SIEM for better accuracy, building out our team's internal wiki, and mentoring junior analysts to help level up our SOC operations.
Security Analyst
I handled the day-to-day work of spotting and responding to security threats across the entire enterprise. Most of my time was spent triaging potential incidents—investigating phishing attempts, malware, and rogue access points—and then deciding whether to escalate them or close them out after suggesting the right fix to mitigate the risk.
Application Security Consultant
I ran security scans (DAST/SAST) for a wide range of clients, including some Fortune 500s, using tools like HP WebInspect and Fortify SCA. My job was to dig into the results to filter out the noise, manually validating vulnerabilities across everything from modern languages like Java and .NET to legacy COBOL systems, and then put together the final reports with clear recommendations on how to fix the vulnerabilities.
Software Engineer
I kept the UNIX-based ETL system at Lexis-Nexis running smoothly, jumping in to make updates or fixes whenever QA found an issue. Most of my day was spent digging into why a job was delayed or why a production error happened, then getting those findings into a report. On the technical side, I was constantly in the weeds with Perl, XML, and IBM JCL to handle any necessary code changes, all while keeping everything tracked in WebStar.
Projects
01
jsoquerata.com - Automated Cloud Infrastructure & DevSecOps Pipeline
Built and automated a full cloud infrastructure on AWS using Terraform and Ansible, with a GitHub Actions CI/CD pipeline embedding SAST (Checkov, Semgrep) and DAST (OWASP ZAP) at every deployment. Zero manual steps from code to production.
02
Crowdstrike Maintentance Token Recovery Tool
Built a Python desktop application with a GUI (Tkinter) using the CrowdStrike API to remotely retrieve maintenance tokens for endpoints no longer reporting to the Falcon console, eliminating manual intervention for the Endpoint team.
03
Network Segmentation Redesign
Redesigned a flat enterprise network into a zero-trust segmented architecture, reducing lateral movement potential and isolating critical assets.
04
Security Awareness Programme
Designed and ran a company-wide phishing simulation and training programme, achieving a 60% drop in click rates within six months.
Skills
Endpoint Security
- EDR / XDR
- CrowdStrike Falcon
- Cylance
- Hardening & CIS Benchmarks
- Malware Analysis
Email & Network
- Proofpoint
- Microsoft EXO/MDO
- SPF / DKIM / DMARC
- Zscaler Private Access / Internet Security
- Firewall & IDS/IPS
- Zero Trust Architecture
- VPN & Network Segmentation
Operations
- Security Operations
- SIEM (ELK, ArcSight)
- Incident Response
- Threat Intelligence
- MITRE ATT&CK
- Scripting (Python, Bash)
- Infrastructure-as-a-Code
Certifications and Education
2024
GIAC Python Coder
GIAC/SANS SEC573
2016
EC-Council Certified Security Analyst
EC-Council
2015
Certified Ethical Hacker v9
EC-Council
2011
Bachelor of Science in Computer Science
Adamson University
Contact