[ download_resume.pdf ]
mathew@dfw:~ — portfolio.sh
[+] connection established
[+] mounting /experience /projects /skills
[+] system ready
MATHEW O.
 █████╗ ██████╗ ██╗ ██████╗ ██╗      █████╗
██╔══██╗██╔══██╗██║██╔═══██╗██║     ██╔══██╗
███████║██████╔╝██║██║   ██║██║     ███████║
██╔══██║██╔══██╗██║██║   ██║██║     ██╔══██║
██║  ██║██████╔╝██║╚██████╔╝███████╗██║  ██║
╚═╝  ╚═╝╚═════╝ ╚═╝ ╚═════╝ ╚══════╝╚═╝  ╚═╝
IT SYSTEMS & CYBERSECURITY ANALYST
dallas, tx · san francisco bay area · remote
guest@portfolio:~$whoami
IT professional with 5+ years spanning enterprise endpoint management,
network infrastructure, and cybersecurity operations.
CompTIA Security+ (SY0-701) certified. Currently pursuing VMware VCP-DCV.
Building tooling and running a home lab to stay sharp.

guest@portfolio:~$cat preferences.txt
target: cybersecurity analyst · systems administrator · infrastructure engineer
location: dallas, tx · san francisco bay area · remote
status: open to new opportunities

guest@portfolio:~$ls -la projects/
total 3
[OK] cybersec-homelab/ A self-managed detection and response lab running Wazuh, Suricata, and Wireshark on virtualized infrastructure
[WIP] trenchwatch/ A Solana token monitoring bot that classifies new token launches as runner, slow cook, rug, or dead using on-chain signals and behavioral heuristics
[OK] this-site/ A static portfolio built with Astro, served by nginx on the same VPS that runs TrenchWatch

guest@portfolio:~$ 

cat about.md

IT professional with 5+ years spanning enterprise endpoint management, network infrastructure, and cybersecurity operations. I've worked across large environments at ExxonMobil and BART — device fleet management with JAMF, Intune, SCCM, and BigFix across mixed Windows and macOS estates.

Most recently: Infrastructure Analyst II and Cyber Security Analyst II at MSTS, supporting the DOE Special Technologies Laboratory in Santa Barbara. Federal infrastructure, vulnerability assessments, and incident response under NIST 800-61. That work sharpened my focus on dedicated security operations.

Outside the day job I run a home lab — Wazuh, Suricata, Kali Linux — and build tooling: TrenchWatch is a Solana token signal bot; this site runs on my own VPS. CompTIA Security+ certified (SY0-701), pursuing VMware VCP-DCV. Based in Dallas, TX. Targeting cybersecurity analyst and infrastructure roles. Open to relocation.

git log --graph --all

* commit 2815c5d   (HEAD -> bart-coordinator)
| Author: contract
|
|     Computer Support Coordinator (contract) · BART · Oakland, CA
* commit 743bde1
| Author: full-time
|
|     Infrastructure Analyst II / Cyber Security Analyst II · Mission Support and Test Services (MSTS) · Santa Barbara, CA
* commit 784d2b3
| Author: full-time
|
|     Computer Support Administrator · BART · Oakland, CA
* commit 636ff57
| Author: full-time
|
|     Computer Support Analyst · BART · Oakland, CA
* commit 5234506
| Author: internship
|
|     Network and Cyber Security Intern (internship) · BART · Oakland, CA
* commit 57ab7f6
| Author: full-time
|
|     Desktop and Network Support Engineer · ExxonMobil · Castro Valley, CA

ls -la projects/

[OK] cybersec-homelab/ used to simulate attacks, tune detection rules, and study incident response workflows. [open ›]
[WIP] trenchwatch/ running live on this VPS in shadow mode. [open ›]
[OK] this-site/ built and deployed natively on the box with no CI/CD pipeline. [open ›]

nmap -A skills.local

PORT     STATE  SERVICE               VERSION
22/tcp open   security-monitoring tenable nessus, wazuh, suricata, wireshark, nist 800-61, vulnerability management, incident response
445/tcp open   endpoint-systems windows, macos, linux, jamf, intune, sccm, bigfix
80/tcp open   network tcp/ip, vlans, cisco ios, palo alto, firewall ops, vpn
443/tcp open   virtualization-cloud vmware vsphere, esxi, hyper-v, azure fundamentals
389/tcp open   identity onelogin, okta, active directory, mfa
8080/tcp open   ticketing-itsm servicenow, bmc remedyforce
8443/tcp open   scripting powershell, bash, python (basic)

cat certs.txt

[✓] CompTIA Security+ // SY0-701 · CompTIA · earned 2026-04-24
[~] VMware VCP-DCV // Broadcom
[✓] B.S. Computer Science // San Francisco State University

curl localhost/status.json

# this site is hosted on the box below
hostname
uptime
load avg
commit
updated
fetching...

cat contact.txt

location dallas, tx · san francisco bay area · remote
[ download_resume.pdf ]
// think you'd make the right call?
type help to see available commands
guest@portfolio:~$