Intro
My name is Sergio Uncos and I am a Cybersecurity Professional with a total of +6 years of IT
experience and +3
years working in Information Security. I have a proven track record of success in
protecting systems and data from malicious actors and other cyber threats.
On this website, I will be sharing all my knowledge, experience, CTF walkthrough machines,
articles about Security Awareness, current working projects, and labs with the goal of
helping others stay safe online.
Technical Skills:
Operating Systems:
Windows & Linux environment management, Active Directory, Policy & procedures enforcing,
Virtualization (VirtualBox/VMWare), Hardening (CIS Benchmarks)
Security:
Security Assessments, OSINT (Open Source Intelligence), Networking TCP/IP, OWASP Web (Web
Application Security), SAST/DAST (Static and Dynamic Application Security Testing), Wireshark,
Kaspersky, Windows Firewall, iptables (Linux), Wazuh SIEM (Security Information and Event
Management, ELK Stack: Elasticsearch, Logstash,
Kibana), Metasploit, Nmap, Nessus, Rapid7 Nexpose, OpenVAS
Security Automation Tools::
Fortify, Snyk, SonarQube, SonarCloud, Checkov, OWASP ZAP (Zed Attack Proxy), Burp Suite, Nmap,
Nessus, Rapid7 Nexpose, OpenVAS
Cloud Computing (AWS):
IAM, Security Groups, VPC (Virtual Private Cloud), EC2 (Elastic Compute Cloud), Terraform
Containers:
Docker
Authentication and Identity Management:
Okta, Google Authenticator
Scripting Languages:
Python, Bash
Practice builds knowledge; knowledge builds confidence.
Work Experience
Latch, United States - Information Security Specialist
December 2023 - Present
- Security Infrastructure Management: Configuring and overseeing security tools, such as
intrusion
detection/prevention systems and endpoint protection solutions, to protect against cyber
threats.
- Access Control Administration: Implementing access controls and authentication mechanisms to
protect sensitive resources from unauthorized access.
- Risk Assessment & Vulnerability Management: Identifying and evaluating potential security
risks
and vulnerabilities within systems, networks, and processes.
- Incident Response Leadership: Developing and refining an incident response plan,
coordinating
with IT teams for rapid mitigation actions, and conducting post-incident analyses.
- Compliance & Audit Collaboration: Working with auditors to facilitate audits and ensure
compliance with regulatory requirements, reinforcing the organization's commitment to a
secure
and compliant IT environment.
This role demands a deep understanding of information security principles and the ability to
apply them in a dynamic, fast-paced environment. It involves not just preventing and
responding
to threats, but also fostering a culture of security awareness and resilience across the
organization.
Freelance, United States — SOC 2 Reviewer
November 2022 - Present
- Conducted comprehensive SOC 2 Type 2 compliance reviews of organization's policies,
procedures,
and
systems.
- Identified and reported compliance gaps and areas of non-compliance to stakeholders.
- Recommended improvements to controls and processes to meet SOC 2 Type 2 requirements.
- Collaborated with IT, security, and compliance teams to resolve compliance issues.
- Maintained detailed records of SOC 2 Type 2 compliance activities, including audit plans,
findings,
and recommendations.
- Ensured the organization met the highest standards for protecting their systems and data.
- Helped build trust with customers and stakeholders by demonstrating the organization's
commitment to
maintaining high levels of security and compliance.
Wazuh, Spain — IT Security Engineer
July 2022 - December 2022
- Successfully implement, tailor, provide assistance and manage the software product for new
and
existing global customers.
- Collect user feedback, recognize user demands, prerequisites and enterprise motivators for
mechanization and coordination resolutions.
- Deliver detailed and advanced technological demonstrations for clients, collaborators and
potential
customers.
- Educate users to empower their future self-reliant utilization and setup.
- Guide and instruct security engineers, security operations teams and emergency responders.
EdgeUno, United States — Security Engineer
July 2021 - July 2022
- Implemented, enforced, and refined information security policies using industry-standard
frameworks
like NIST and CIS for comprehensive protection.
- Conducted vulnerability management and regular penetration testing for EdgeUno and clients
using
tools like Nessus, Nmap, and Burp Suite.
- Operated and maintained the SIEM platform and utilized data security and compliance tools,
ensuring
compliance with GDPR and other regulatory standards.
- Responded to incidents, conducted investigations, and improved enterprise security through
customization and automation using self-developed tools with Python.
- Deployed and managed corporate security systems for robust protection using technologies
like
firewalls, VPNs, and IDS/IPS.
- Conducted research and evaluation to develop product security planning and identify
potential
risks,
leveraging threat intelligence feeds and security advisories.
Novared, Argentina — Information Security Analyst
November 2020 - July 2021
- Managed, configured, and supported McAfee platforms (ePO, DLP, ATD, ENS, MVISION) and
Tenable
for
incident reports and alerts about discovered vulnerabilities, ensuring comprehensive
security.
- Escalated product issues to third-party vendors and suppliers for swift resolution,
minimizing
downtime.
- Developed reports with useful information, including the performance of installed products
on
customers.
- Conducted root cause analysis of incidents within labs and tested new configurations,
ensuring
continuous improvement of products and services.
- Maintained awareness of emerging threats and technologies and evaluated new products and
services to
enhance security capabilities.
About
I have a strong passion for assisting others to achieve their goals and also offering support and
coaching. My devotion to learning allowed me to become fluent in English, Portuguese,
and Spanish.
I do consider myself as a knowledge seeker, an explorer. Based on this, there is a growing list
of books that have helped me during my career and strongly recommend:
- Atomic Habits - James Clear
- The Power of Habits - Charles Duhigg
- Make Your Bed - William H. McRaven
- Enfócate - Cal Newport
- The Four Agreements - Miguel Ángel Ruiz Macías
- The Life-Changing Magic of Tidying Up - Marie Kondo
- Limitless - Jim Kwik
Recognitions
AWS
(Certified Cloud Practitioner)
Open
Source
Vulnerability Management Lecture
C1 English Level
Contact
This is where you can get in touch with me! I'm always happy to hear from you, whether you have a
question, a comment, or just want to say hello.
I'm always up for a good conversation. Whether you have a question about my work, want to share your
own thoughts and ideas, or just need someone to vent to, I'm here for you.
So go ahead and drop me a line! I'm looking forward to hearing from you.
Tools
Here you can find a collection of tools that I use on a daily basis and which are highly recommended.
IP & URL Reputation
Malware analysis
Simulate browser
SAST - DAST
- Snyk - Opensource tool for scanning your
projects and code. It does provide a VSC extension to solve issues during development stage.
- HostedScan - An online OWASP Zap ready
to use for DAST
- Checkov - IaC scanner, more reliable
than Snyk during IaC code scanning
- SonarCloud/SonarQube - Its main focus
is SAST and SCA analysis, but it can also be used for DAST and IAST because it integrates
with several tools.