Derick Dmello

Hi, I'm Derick Dmello

Cyber Security SME & IT Specialist

A curiosity-driven enthusiast with a knack for investigating and solving problems. With 3 years of experience in Incident Response, Threat Intelligence Analysis, and Security Operations,
I'm passionate about building secure and resilient digital environments.

Request Resume
CEHM Badge CEHP Master Badge CEH Badge ECSA Badge SEC+ Badge CC Badge Cybops Badge RHCSA Badge

About Me

Derick Dmello

Hello there! πŸ‘‹πŸ» I'm Derick Dmello, a Security Analyst with 3+ years of work experience and an educational background with over 6 years in Cyber Security, IT Infra, Network and Forensics. Looking for the next high stakes SOC & IRT gig to showcase my awesome/precise investigation capability and knowledge to tackle that head-scratching security incident. Be it on-site or on-call. I'll be there.

I am a self taught red teamer with a keen focus on cyber defense. So, root cause analysis and CTI is the base of all my high confidence reports. Having worked in securing State Agencies and Higher Education instutites, governance and compliance is my second forte. I have managed all this with strong risk and project management, with confident stakeholder management and quick turn around time. I am an avid learner and love to participate in CTFs to test my investigative instincts in a competitive environment.

Core Competencies

Security Operations & SIEM / MDR

Monitoring, analyzing, and responding to security incidents in real-time.

Splunk SIEM Elastic Stack / ELK Wazuh CrowdStrike Falcon The HIVE Project MITRE ATT&CK Nessus OpenVAS

Network Security & IT Infra Admin

Securing network infrastructure and managing enterprise access controls.

Cisco Networks Checkpoint NGFW Active Directory Wireshark TCP/IP Analysis VPN & IDS/IPS Windows Group Policy Jira SQL / MySQL

Cloud, Virtualization & Gen AI

Managing scalable cloud environments and virtualized systems with the lastest security AI.

AWS Azure GCP Entra ID MS Sentinel VMWare VirtualBox ESXi Copilot ChatGPT Gemini

Governance, Risk & Compliance

Ensuring systems adhere to regulatory compliance to manage and mitigate risks.

NIST CSF NIST 800-53 NIST 800-37 ISO 27001:2022 - ISMS ISO 42001:2023 - AIMS CIS 18 PCI-DSS SOC 2 HIPAA RSA Archer TPRM

Digital Forensics & Analysis

Investigating breaches through artifact acquisition, preservation and analysis.

Autopsy KAPE CAINE AccessData FTK Imager Redline Volatility Belkasoft Evidence Center X Windows Foreniscs Linux Forensics

DevSecOps

Bridging security and development practices for secure software delivery.

SDLC SSDLC CI/CD & Build Security SAST DAST Github GitLab Kubernetes Docker Ansible Terraform AWS Cloudformation

I Have Worked With

NYS Office of ITS

Information Security Analyst

Key Impact

Oversaw cybersecurity risk governance for 65+ multi-agency projects, improving statewide secure solution deployment and project compliance by 90%.

core Skills

Risk Management RSA Archer NIST 800-37
NYSED Logo

NYS Education Department

Cyber Security Analyst

Key Impact

- Led 200+ security investigations in a State level SOC environment, securing 3000+ employees and 35000+ endpoints.

- Led security audit for securing NY State central school districts, protecting student data and district infrastructure.

Core Skills

Incident Response GRC / Audit Digital Forenscs SIEM / MDR NIST CSF / 800-53 CIS
NSA Logo

National Security Agency

GS Cyber Security Researcher

Key Impact

Developed a robust framework to improve observability in cloud to detect and respond to threats.

Core Skills

Cloud Security Intelligence Gathering Digital Forenscs Threat Research Framework Development
ISC2 Logo

ISC2

Cyber SME - Exam Developer

Key Impact

As a cyber security SME exam developer, I presented expertise to refine ISC2 CC certification.

Core Skills

Cyber Security Security Controls Workforce Development Item Auditor
VTF Logo

Virtually Testing Fonundation

Cyber Security Associate

Key Impact

Improved detection and response maturity through ATT&CK-based threat modeling and Cortex XDR defensive analysis.

Core Skills

Threat Assessment & Modeling Custom Exploit Development / SDLC C2 Threat Research XDR IT Infra Development / SysDLC MITRE ATT&CK Azure
VCL Logo

Virtual Cyber Labs

Security Blue Team Intern

Key Impact

Improved incident response effectiveness through root-cause analysis and network forensics.

Core Skills

Malware Analysis Digital Forensics Autopsy Redline Wireshark
CSI Logo

Cyber Secured India

DFCS Intern

Key Impact

Complete process owner for application and endpoint security through vulnerability discovery, exploitation, forensics analysis and hardening.

Core Skills

Penetration Testing Digital Foreniscs Burpsuite Priv Esc Autopsy

My Projects

A collection of security research, tools, and documentation showcasing my work in offensive and defensive cybersecurity.

🐍

Mini-PySec Projects

Small scale locally deployable Python projects for offensive and defensive security research and testing.

Python Security Pentesting Automation
πŸ‘€

The Employee Simulator

A modular Python framework to simulate normal employee behavior on Windows endpoints for EDR baseline research and testing.

Python EDR Windows Blue Team
πŸ’€

Rax C2 Server

A compact Command & Control Server and agent deployment package for red team operations and security research.

Python C2 Red Team Offensive
☁️

Citrix Virtualization

A home lab project on virtualization of infrastructure using Citrix Systems Solutions for enterprise environments.

Citrix VDI Homelab Enterprise
⌚

Wearable Technology Security

Research project focusing on security vulnerabilities in modern wearable devices and IoT ecosystems.

IoT Vulnerability Wearables Risk Assessment
πŸ”

Threat Intelligence Report

In-depth CTI analysis on the threat landscape of the global shipping industry in accordance with ICD 302.

CTI Intelligence Community Directive 302 OSINT
πŸ–₯️

Homelab Enterprise IT

Designed and built a home laboratory to simulate enterprise-level IT infrastructure with AD, Cloud, and monitoring.

Active Directory Azure VMware Homelab
πŸ•ΈοΈ

Open Source WebApp Pentesting

Showcases the 'arbitrary user input' problem through OWASP Top 10 vulnerabilities combined with threat actor TTPs.

OWASP Burpsuite Pentesting
πŸ›‘οΈ

Cyber Defence: SOC Operations

Part one of a two-part thesis covering fundamentals and practical operations in Security Operations Center environments.

SOC Blue Team Case Study Thesis
πŸ”¬

Cyber Defence: DFIR Methodologies

Part two of a two-part thesis covering Digital Forensics and Incident Response methodologies, artifact analysis, and investigation procedures.

DFIR Forensics Artifacts Incident Response Case Study

Achievements & Certifications

Certifications

EC-Council Certified SOC Analyst
(CSA)
EC-Council Certified Ethical Hacker - Master
(CEH-M)
ISC2 Certified in Cybersecurity (CC)
CompTIA Security+
AWS Security
Cisco CyberOps Associate
ISO/IEC 27001:2022
Lead Auditor
Qualys Certified PCI Compliance Specialist

Recommendations From

Marlowe Cochran

Chief Information Security Officer

New York State Education Department

Livia Hendrickson

Manager ITS I

Chief Information Security Office
New York State Office of ITS

George Ventura

IT Specialist III (Information Security)

New York State Education Department

Ujjwal Tripathi

Manager ITS I

Chief Information Security Office
New York State Office of ITS

Tom Vaselekos

Cyber Security Analyst

Empire State Development (NYS)

Nabin Sapkota

IT Specialist III (Information Security)

Chief Information Security Office
New York State Office of ITS

Melpomeni "Mel" Doutsis

IT Specialist II (Network Engineer)

New York State Office of ITS

Recognitions

ISC2 Cybersecurity Exam Developer

Invited by ISC2 as a Subject Matter Expert (SME) to participate as an Exam Developer contributing to the development of;
- Certified in Cybersecurity (ISC2 CC)

EC Council Cybersecurity
Career Mentor

Selected by EC Council as a cybersecurity career mentor to support and empower the next generation of cybersecurity professionals.

Student Organization Founder & President, CipherCodeX

A Letter of Recognition from Dept. of AIM, Gujarat University for creating and leading a student organization focusing on Cybersecurity Research and Training (CRT).

Get In Touch

I'm currently open to new opportunities and collaborations.
If you have a project in mind or just want to connect, feel free to reach out!