Gareth Sheldon
Cybersecurity Professional | IT Systems Engineer
[ Cape Town, Western Cape, South Africa ]
Personnel File
[SUBJECT] Gareth Sheldon — Lead Technical Engineer specializing in Cybersecurity and Infrastructure. Bridging rigid infrastructure engineering with adaptive security strategy, orchestrating secure, high-availability environments within the FinTech sector.
[EXPERTISE] Core competencies include SecOps & Incident Response (Microsoft Sentinel, KQL, SIEM/SOAR), Identity & Access Management (Entra ID, Zero Trust, Conditional Access), and Network Engineering (Cisco, FortiGate, Sophos XG). Proven compliance expertise with GDPR, PCI-DSS, ISO 27001, and Cyber Essentials.
"Proactive defense and continuous monitoring are the foundations that protect digital assets from ever-evolving threats. Building security into every layer."
S.P.E.C.I.A.L. Skills
Security Operations
Network & Infrastructure
Cloud & Identity
Compliance & Frameworks
DevSecOps & Automation
Vulnerability & Forensics
Service Record
Lead Technical Engineer / Senior Service Desk Engineer
@ Advania UK- Optimized Microsoft Sentinel for advanced threat detection and KQL-based alert correlation for FinTech compliance
- Primary escalation point for complex security incidents with EDR telemetry analysis and Root Cause Analysis (RCA)
- Managed identity platforms using Entra ID (Azure AD Hybrid) and Intune with Zero Trust and SAML SSO
- Engineered sophisticated Cisco infrastructure including routing, switching, and active-passive firewalls
- Delivered strategic cloud modernization and security hardening projects under high-pressure SLA compliance
- Provided mentorship and developed technical troubleshooting guides for internal teams
Senior Technical Engineer & Cybersecurity Analyst
@ Gavotech IT Solutions- Led incident response efforts across cloud and on-premises environments
- Deployed SentinelOne EDR with behavioral AI, reducing malware incidents by 35% and response times by 30%
- Configured Sophos XG and FortiGate firewalls, reducing network breaches by 30%
- Conducted digital forensics using Autopsy, FTK, and SANS SIFT to analyze TTPs
- Managed 1,000+ devices across Windows, macOS, and Linux using Datto RMM
- Architected CI/CD pipelines with Kubernetes and Docker Swarm for security tool deployment
Product Tester / Game Tester
@ Testlio / Lionbridge Games- Executed exploratory and regression testing for mobile and web applications
- Validated complex onboarding flows for crypto-banking platforms
- Systematic bug documentation and technical reporting for rapid issue resolution
- Contributed to successful enterprise-grade application launches
IT Technician / Data Capturer
@ Pragmatic Accounting- Troubleshot network and production issues with root-cause analysis
- Assisted in migrating critical infrastructure to cloud-based solutions
- Proactively monitored systems to reduce downtime
- Provided remote technical support and hardware/software installation
Mission Log
IoT & OT Security Auditor Suite
PowerShell-based security assessment toolkit for IoT/OT environments
- >Dual-version: v2.0 Enhanced (IT/ITAM, COBIT/ITIL/NIST) and v3.0 Enterprise (M365 E5, Defender for Endpoint/IoT)
- >Automated risk scoring engine: 100+ controls, quantitative scores (0-100), qualitative classifications
- >Compliance: GDPR, HIPAA, PCI-DSS, ISO 27001, IEC 62443
The MSP Toolkit
Automated IT Diagnostic & Repair Suite with 60+ functions
- >GUI-based PowerShell toolkit: one-click repairs (Teams, Outlook, OneDrive)
- >System health: SFC/CHKDSK, battery health, SMART disk, large file detection
- >Real-time network monitoring, AD secure channel verification, timestamped reports
CVE Detection Engineering Initiative
KQL and YARA-based detection content for emerging CVEs
- >KQL queries for Microsoft Sentinel/Defender exploitation detection
- >YARA rules for payload artifacts and malicious patterns
- >MITRE ATT&CK mapping and reproducible lab environments
Cilium Platform Engineer Discovery Lab
Kubernetes networking with Cilium and eBPF
- >Gateway API, Ingress, L4/L7 traffic management
- >Hubble and Grafana monitoring integration
- >LB IPAM, L2 announcements, TLS termination
Azure Monitor Architecture
Enterprise-Scale AMA & Log Analytics Implementation
- >Log Analytics Workspace with retention policies and health alerting
- >Azure Monitor Agent (AMA) via Data Collection Rules (DCRs)
- >Application Insights, Network Watcher, Action Groups
Tirreno Open Source Security Analytics
Self-hosted security analytics engine (PHP/PostgreSQL)
- >Detects account takeovers, bot attacks, insider threats
- >Analyzes application behavior patterns
- >Open-source deployment and configuration
AD DS Administration Lab
Microsoft VPS VM hands-on assessment
- >Domain controller deployment and AD topology management
- >Sites, subnets, replication, OUs, GPOs
- >NTLM restrictions, fine-grained password policies, audit policies
SOC Threat Intelligence Pipeline
Honeypot, MISP, and Microsoft Sentinel Integration
- >Automated threat intelligence ingestion via Azure Function Apps
- >KQL analytics rules for threat correlation
- >Real-time attacker detection on honeypot infrastructure
AWS S3 & DynamoDB Integration
Web application with cloud storage integration
- >S3 for image storage, DynamoDB for employee directory
- >Bucket policies, IAM roles, table creation
- >End-to-end application testing
Digital Forensics: Autopsy Recovery
Recovering deleted files from disk images
- >Data carving, keyword search, timeline analysis
- >Evidence validation through artifact examination
- >Detailed forensic report generation
DNS Record Checker (Python GUI)
Email security verification tool
- >Python/tkinter GUI for SPF, DMARC, DKIM checks
- >dnspython integration for DNS queries
- >System administrator utility
SOC Automation: Wazuh, TheHive, Shuffle
Automated SOC incident response pipeline
- >Wazuh agent events to Shuffle for enrichment
- >TheHive integration for response coordination
- >Windows 10 VM to cloud manager workflow
Wazuh & Greenbone Vulnerability Lab
Integrated vulnerability detection and remediation
- >GVM + Wazuh enhanced vulnerability detection
- >Automated remediation workflows
- >Centralized security posture dashboard
OSINT Investigation Project
Open Source Intelligence methodologies
- >Reverse image search, email OSINT, phone OSINT
- >Tools: Epieos, HIBP, Phonebook.cz, Hunter.io
- >PhoneInfoga, Yandex image search
Certifications
45+ Professional Certifications
Fortinet
4 certifications
Microsoft
3 certifications
AWS
5 certifications
Kaseya
4 certifications
Sophos
3 certifications
3 certifications
Security Blue Team
5 certifications
Cisco
4 certifications
EC-Council
3 certifications
IBM
2 certifications
Other
9 certifications
Education
Bachelor of Science in Cybersecurity
IU International University of Applied Sciences
January 2025 - December 2029
Establish Contact
Whether you need to strengthen your security posture, require a seasoned engineer for your cybersecurity initiatives, or want to discuss threat defense strategies—I'm ready to connect.
Connect on LinkedIn