OPS TERMINAL — AUTHENTICATED
VIEW SUBJECT FILE
ACCESS CAPABILITIES
VIEW OPERATIONS LOG
DECLASSIFY ALL REDACTED
DECRYPT HERO HEADER
OPEN OPERATOR TERMINAL
SHOW SECRET COMMANDS
!BREACH PROTOCOL
SUBJECT STATUS REPORT
SECRET COMMANDS — CLASSIFIED
decryptglitch the hero header
statuslive subject status report
helpshow this list
gameopen classified snake
nmapscan the host
hireinitiate recruitment sequence
↑↑↓↓←→←→BAbreach protocol overlay
RIGHT-CLICKops context menu
click stat numsscramble animation
click skill itemscycle clearance levels
hover redactedreveal classified intel
click proj titleexpand operation brief
>_ buttonfull operator terminal
idle 30ssession expiry warning
shake mousescreen glitch effect
view sourcefind the hidden flag
hover footer cipherdecode ROT13 message
double-click h2heading glitch
inspect the formfind the honeypot field
ghost text (hero)hover the invisible line
NMAP SCAN RESULTS
EYES ONLY
ACCESS GRANTED — WELCOME, OPERATOR
OPERATOR TERMINAL — ghost@portfolio:~
ghost@portfolio:~$ 
CLASSIFIED SNAKE
SCORE: 0
WASD / ARROW KEYS TO MOVE • ENTER TO RESTART
⚠ SESSION
INACTIVITY DETECTED
CONNECTION WILL TERMINATE IN
10
RECRUITMENT SEQUENCE
// initiating secure recruitment channel...
[OK] Candidate profile: GHOST_1B4
[OK] Clearance verified: TS/SCI
[OK] 6 years active duty: CONFIRMED
[OK] Adversarial expertise: VALIDATED
[>>] Proceed to contact form below.
[>>] Or email directly. Encrypted preferred.
PROCEED TO CONTACT ↗
TOP SECRET // SCI
GHOST
PORTFOLIO — ACTIVE ASSET

YOUR
NAME.

[ CALLSIGN: GHOST_1B4 // ACCESS: TS-SCI // MISSION: HIRED ]

Six years. USAF 1B4X1 CNO Interactive Operator & ExploiterAFSC: 1B4X1, conducting computer network operations against sophisticated nation-state adversaries.

Now transitioning to private sector — bringing the adversary's perspective to your defense.

6Years Active DutyUSAF Cyber Operations
1B4AFSC DesignationCNO Interactive Operator
TSClearance LevelSCI — update as needed
0Breaches Loggedclick to increment
01
// SUBJECT DOSSIER

ABOUT THE ASSET

SUBJECT PHOTOAUTHENTICATED
YN
IDENTIFIED
BranchUSAF
AFSC1B4X1
TIS6 Years
ClearanceTS/SCI
StatusTRANSITIONING
LocationSan Antonio, TX

I am a USAF 1B4X1 CNO Interactive Operator & Exploiter with six years executing computer network operations in support of national security objectives. My work required understanding — at a technical and operational level — how sophisticated adversaries penetrate, persist in, and exfiltrate from hardened networks.

I have operated against nation-state actors and advanced persistent threatsincluding multiple APT groups spanning target development, network exploitation, access operations, and coordinated joint cyber missions. I know how attackers think because that was my jobclassified under EO 13526.

Transitioning now to bring that precision and adversarial mindset to threat intelligence, incident response, and red team operations — especially where the stakes are real.

"The best defense is built by people who understand the offense."— CNO OPERATOR'S CREED
02
// CAPABILITY ASSESSMENT

SKILLS & WEAPONS

01

Offensive Ops

  • CNO / CNE OperationsTS/SCI
  • Target DevelopmentSECRET
  • Network ExploitationTS/SCI
  • Access OperationsTS/SCI
  • Persistence & PivotingSECRET
  • Lateral MovementSECRET
02

Threat Intel

  • APT TrackingSECRET
  • TTP AnalysisCONFIDENTIAL
  • MITRE ATT&CKUNCLASS
  • OSINTUNCLASS
  • STIX / TAXIIUNCLASS
  • HUMINT FusionTS/SCI
03

Defensive Ops

  • Incident ResponseUNCLASS
  • Malware AnalysisCONFIDENTIAL
  • Reverse EngineeringCONFIDENTIAL
  • Digital ForensicsUNCLASS
  • SIEM / SOARUNCLASS
04

Tech Stack

  • PythonUNCLASS
  • Linux / BashUNCLASS
  • Networking ProtocolsUNCLASS
  • SplunkUNCLASS
  • WiresharkUNCLASS
  • Burp SuiteUNCLASS
05

Command & Control

  • Mission PlanningSECRET
  • Intel ReportingSECRET
  • Risk AssessmentUNCLASS
  • Team LeadershipUNCLASS
  • Briefing StakeholdersUNCLASS
06

Certifications

  • Security+UNCLASS
  • CEHUNCLASS
  • [ Add yours ]UNCLASS
03
// OPERATIONS LOG

FEATURED WORK

OPERATION
FILE: OP-0x01
ACTIVE

THREAT ACTOR PROFILE TOOL

Python CLI that maps observed APT behaviors to MITRE ATT&CK, generating structured intel reports for blue team consumption. Cuts analysis time by 60%.

PythonMITRE ATT&CKSTIX/TAXIIThreat Intel
// OPERATION BRIEF: Developed after recognizing that manual TTP mapping was a bottleneck for small blue teams. The tool ingests raw IOCs and behavioral data, cross-references against ATT&CK matrices, and outputs standardized STIX 2.1 bundles. Designed from an operator's perspective — fast, accurate, no noise.
// STATUS: Open source. Link available on request.
OPERATION
FILE: OP-0x02
COMPLETE

NETWORK ANOMALY DASHBOARD

Splunk detection built from adversary perspective — modeling post-compromise behavior including lateral movement, credential access, and C2 beaconing.

SplunkSPLNetwork Analysis
// OPERATION BRIEF: Built detection logic by modeling what I would do as an operator — where would I beacon from? How often? What does normal look like vs. scheduled task abuse? The dashboard catches what signature-based tools miss.
// STATUS: Deployed in a lab environment. Available for demo.
OPERATION
FILE: OP-0x03
ACTIVE

ADD YOUR PROJECT HERE

Describe what you built, what problem it solves, and the measurable impact. Give it a codename. Click this row to expand and add a detailed brief.

TOOLLANGUAGE
// OPERATION BRIEF: Add more context here — architecture decisions, challenges overcome, impact achieved. This section expands when a visitor clicks the row.
// STATUS: Replace with your real project status.
04
// INITIATE CONTACT

MAKE CONTACT

Whether you're exploring SkillBridge opportunities, full-time roles in threat intelligence or SOC operations, or you want to talk shop about CNO — I'm listening.