HI, I'M
TYLER.

CYBERSECURITY · THREAT HUNTING · DEFENSE

I'm a cybersecurity student at Western Governors University pursuing a B.S. in Cybersecurity and Information Assurance. I build hands-on labs and technical projects that show my commitment to learning, problem-solving, and designing secure systems — investigating threats, hardening infrastructure, and turning raw telemetry into actionable defense.

Tyler Droxler
[ featured_work ]

HANDS-ON LABS

A collection of hands-on labs exploring threat hunting, analysis, vulnerability remediation, and compliance. Real infrastructure, real telemetry, real defense.

View all projects
Brute Force Attacks

Monitoring Brute Force Attacks

Project

Built an Azure honeypot to capture brute-force login attempts. Investigated attacker activity with KQL and visualized source geolocations on a custom map.

Azure MDE KQL
CTF Threat Hunt

CTF — Threat Hunt

CTF

Capture-the-flag threat hunt simulating a corporate compromise. Traced adversary activity via MDE telemetry and KQL to build a timeline across the attack lifecycle.

Azure EDR KQL
Threat Hunting Investigation

Threat Hunting Investigation

Incident

Investigated suspected TOR browser use to bypass company controls. Traced file activity, process execution, and network connections to known relay nodes.

Azure EDR KQL
Phishing Analyzer

Phishing Analyzer

Tool

A Python tool that scans .eml files for phishing indicators. Checks sender, body, links, and attachments — assigns a score, verdict, and optional VirusTotal checks.

Python VirusTotal
Vulnerability Management

Vulnerability Management

Project

Scanned an Azure environment with Nessus to uncover vulnerabilities across VMs and services. Prioritized high-severity risks and validated fixes through follow-up scans.

Azure Nessus
AI SOC Analyst

AI SOC Analyst

Tool

Python workflow connecting the OpenAI API to an Azure environment for log aggregation. AI-driven triage accelerates detection and reduces manual SOC workload.

Python OpenAI Azure
[ experience ]

WORK HISTORY

JUN 2025 — PRESENT
Cybersecurity Support Analyst (Intern)
Log(N) Pacific REMOTE
  • Conducted Tenable scans and DISA STIG audits across Windows and Linux VMs; prioritized risk and delivered remediation guidance. Eliminated 100% of critical, 90% of high, and 68% of medium vulnerabilities through PowerShell automation.
  • Performed EDR threat hunts with KQL to identify IoCs (brute-force, exfiltration, ransomware); created Defender detection rules to automate containment.
  • Built Sentinel dashboards for SOC visibility and blocked internet-facing attack vectors with NSG/firewall rules to eliminate brute-force incidents.
OCT 2025 — PRESENT
Information Security Consultant
Fideri Network PHILADELPHIA · PA
  • Designed and deployed an internal SMTP GoPhish server to run company-wide simulated phishing campaigns for security awareness training. Configured infrastructure, campaign tracking, and reporting dashboards to measure click-through and credential submission rates.
  • Implemented server hardening and access controls to secure the phishing simulation infrastructure and prevent external abuse.
AUG 2020 — PRESENT
Pest Control Technician
Prodigy Pest Solutions PHILADELPHIA · PA
[ education ]

ACADEMIC FOUNDATION

SALT LAKE CITY · UT · GRADUATION MAY 2026
Bachelor of Science — Cybersecurity & Information Assurance
Western Governors University

Completed competency-based coursework covering network security, cryptography, digital forensics, incident response, vulnerability assessment, cloud security, Python scripting, SQL optimization, Linux administration, SIEM tools, and NIST/ISO security frameworks.

TryHackMe
Hands-on rooms covering penetration testing, privilege escalation, web exploitation, network analysis, and blue team fundamentals.
Hack The Box
Structured lab machines and challenges targeting real-world attack and defense scenarios across varying difficulty levels.
Cyber Range
Simulated enterprise environments used to practice threat detection, incident response, and network defense under realistic conditions.
MyDFIR SOC Analyst Course
Comprehensive SOC simulation covering Microsoft Defender for Endpoint, Microsoft Sentinel, Splunk, phishing analysis, and foundational defensive security workflows.
[ certifications ]

VERIFIED CREDENTIALS

[ contact ]