Hey, I’m Daniel
I’m a cybersecurity analyst based in Winston-Salem, NC. I graduated from UNC Pembroke in December 2025 with a BS in Computer Science (Cybersecurity concentration) and hold CompTIA Security+ and CySA+ certifications.
I’m not a purely academic candidate. Last summer I interned at North Carolina’s Electric Cooperatives — a NERC CIP-regulated utility — where I worked on real security operations: monitoring SIEM alerts via CrowdStrike Falcon and ArcticWolf MDR, deploying Tenable Nessus across the fleet, co-authoring security policies, and responding to an active Tycoon2FA phishing campaign that targeted employees. That response involved pulling affected users from SIEM, reverse-engineering the obfuscated HTML payload, tracking how the attack evolved across multiple waves, and recommending full containment — laptop disposal, account deletion, and rotating the company’s email format to block the attacker from re-targeting.
That’s the kind of work I want to keep doing.
What I work with
Security platforms: CrowdStrike Falcon, Tenable Nessus, ArcticWolf MDR, KnowBe4, Microsoft Defender, Checkpoint, Mosyle MDM
Threat analysis & IR: Wireshark, Splunk, VirusTotal, AbuseIPDB, Cisco Duo
Infrastructure & identity: Microsoft Entra, Azure, Google Workspace, Unifi, Meraki
Frameworks: NIST CSF, CIS Controls, MITRE ATT&CK, NERC CIP (regulated environment)
Languages: Python, Bash, Java
What I’ve built
CVE Severity Prediction — Pulled 1,996 CVEs from the NIST NVD API across Windows 7, XP, and 11 and built a severity prediction pipeline comparing Random Forest, XGBoost, and Linear Regression. Landed at R² = 0.83 on CVSS score prediction.
PawPal Ultra — A RAG pipeline built on the Gemini API with semantic indexing over internal markdown knowledge bases. Designed a multi-mode response router with three answer strategies so users have explicit control over whether the answer comes from internal docs, Gemini, or a synthesis of both.
Network Traffic Analysis — CICIDS2017 Capstone — Analyzed 500K+ network events from PCAP files with a team of five using Wireshark and Splunk. Identified a confirmed malicious IP conducting nmap reconnaissance over TCP port 444 and applied a structured IR playbook across DoS, brute force, and infiltration attack patterns.
Background
Alongside my internship, I spent two years as the sole system administrator at a regional nonprofit — handling everything from firewall rule management, VLAN segmentation, and an internal honeypot to full MDM deployment (Mosyle for Apple, Defender for Windows) and a domain migration with zero data loss. I also detected and terminated an unauthorized live stream during a ticketed event in real time, preventing over $15,000 in estimated revenue loss.
That role taught me what it means to own a security posture end-to-end with no team to fall back on.
Certifications
- CompTIA Security+ (SY0-701)
- CompTIA CySA+ (CS0-003)
- Google Technical Support Fundamentals
- Emerging Leaders Certificate — Truist
- CodePath Cybersecurity Certificate
- CodePath Technical Interview Prep Certificate
Let’s connect
I’m actively looking for SOC Analyst and Security Analyst roles — remote or in the NC/Southeast area.
- LinkedIn: linkedin.com/in/daniel-vivar-9b3b37303
- GitHub: github.com/Dannypxp
- Email: vivar6@icloud.com