Julian Johnson
Security Analyst
Professional security analyst with experience in vulnerability management, automation, remediation coordination, and hardening of hybrid cloud and on-premise environments.
About Me
Summary
Cybersecurity analyst with experience in vulnerability management, network security, automation, and scripting. Skilled in Qualys, Nessus, Python, Bash, remediation coordination, and secure infrastructure practices.
Contact
- Email: julian@justsecure.org
- GitHub: github.com/jj-security
- Location: Olympia, WA (Remote-friendly)
Certifications
- GIAC Certified Enterprise Defender (GCED)
- GIAC Web Application Penetration Tester (GWAPT)
- CompTIA A+, Security+, Project+
Education
- B.S. Software Development — Western Governors University
- A.A.S Information Technology — Community College of the Air Force
- Music Theory & Composition — Saddleback College / Irvine Valley College
Experience
Security Analyst III
2021 – PresentInComm Payments • Atlanta, Georgia
InComm Payments provides a broad range of financial services and payment solutions. Our Vulnerability Management team handles scanning and reporting for multiple merchants and compliance frameworks.
- • Expand our vulnerability orchestration framework using third-party tools such as Dazz, Nucleus, and custom Python scripts.
- • Communicate emerging threats and zero-day vulnerabilities to stakeholders for immediate response.
- • Enable penetration test engagements by preparing attack systems, collaborating with testers, and translating results into clear remediation recommendations for clients.
- • Perform PCI-compliant network segmentation testing to validate that cardholder-data environments (CDE) remain fully isolated from non-trusted networks.
- • Assess and document PCI “significant changes,” ensuring that architectural updates, segmentation adjustments, and new systems are revalidated for compliance and security impact.
Application Engineer
2020 – 2021Cincinnati Bell Technology Solutions • Cincinnati, Ohio
- • Built and configured McAfee ePolicy Orchestrator architecture for disaster recovery and testing environments.
- • Analyzed logs during exploitation testing. Created HIPS and DLP signatures to protect against failed attack vectors.
Supervisor, Weapons and Tactics
2018 – 2020United States Air Force • Honolulu, Hawaii
- • In charge of planning and execution of all security operations assigned to the unit.
- • Distributed all-source intelligence and modeled threats.
- • Trained in the Air Force's PBED (Plan, Brief, Execute, Debrief) process, used for continuous improvement and mission planning.
- • Launched Cyber Defender Playbooks within PACAF, later used across broader Air Force cyber units. Documented adversarial and defensive TTPs and trained defenders in their application. Efforts were formally recognized by 24th Air Force.
Endpoint Protection Specialist
2016 – 2018United States Air Force • Honolulu, Hawaii
- • McAfee (Trellix) ePolicy Orchestrator technician. Set up server architecture and managed all software products.
- • Created HIPS signatures, DLP rules, rogue system detection, whitelisted software.
Systems Administrator/Vulnerability Management Technician
2014 – 2016United States Air Force • Yigo, Guam
- • Protected critical infrastrucure during Category 5 typhoon. Redirected subfloor flooding back outside, and fixed failing HVAC systems. Prevented datacenter outage, electrical disasters, and kept bombing operations online with zero downtime.
- • Maintained cool server temps and kept them online for 48 hours during total HVAC/UPS outage while awaiting replacement parts. Gathered every fan from across the base, and configured them for max airflow and positive pressure. Created security checkpoint with defensive posture to protect critical infrastructure.
- • Automated client health using PowerShell scripts at logon.
- • Enhanced scanning, patching, and Active Directory administration using scripts. Passing cyber readiness inspection (DISA CCRI) with 95% compliance rating.
- • Maintained offsite backup storage of classified data in accordance with our data retention and disaster recovery plans.
Skills
Security Tools + Languages
- • Qualys, Nessus, Retina
- • Wiz, Dazz, Nucleus
- • SIEM/Log Analysis (Splunk, Exabeam)
- • Trellix ePolicy Orchestrator (f.k.a. McAfee)
- • CommVault, ADIC Scalar
- • Python, Bash, PowerShell
- • Copilot, OpenAI
Infrastructure
- • Linux (Ubuntu, RHEL, Kali)
- • Windows Server
- • Docker
Contact
Always open to opportunities or collaboration. Feel free to reach out.
Contact Me