Skip to content
View Pharns's full-sized avatar

Highlights

  • Pro

Block or report Pharns

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Pharns/README.md

Pharns Genece

Open to Work Remote Clearance RF/SDR

Security Architect & GRC Engineer

I build the controls I document — cloud guardrails, endpoint hardening, evidence pipelines, and detection workflows that stand up in real operations and audits.

📧 career@pharns.com · 🌐 portfolio.pharns.com · 💼 LinkedIn

USAF Veteran (Service-Disabled) · USPTO Patent Holder · 14 Active Certifications


Why I'm different

  • I implement controls, not just map them. Framework requirements become working configurations, monitoring logic, and documented evidence — not recommendations in a report.
  • I connect governance to operations. Design through implementation through audit-ready outputs — the documentation reflects what actually runs.
  • Unusual edge-domain depth. RF/UAS security (USPTO patents, TraceLock™), governed automation systems, and real operator experience across USAF, a $5.6M startup build, and active consulting.

What I Build

GIAP™ — Governed Intake and Analysis Platform

Production GRC automation platform — end-to-end intake workflow with n8n orchestration and CISO Assistant.

  • Stack: Client portal + n8n + Nextcloud + SuiteCRM + DocuSeal + CISO Assistant (100+ frameworks)
  • Impact: ~70% reduction in audit prep time; HMAC-authenticated webhooks; live demo running
  • Status: Production MVP — 9 workflows operational
  • View Project → · Try Live Demo →

TraceLock™ — Multi-Domain RF Threat Detection

Patent-pending RF surveillance detection across 6 wireless domains simultaneously with forensic-grade logging.

  • Codebase: 25 Python modules · 81 shell scripts · ~12,500 LOC
  • Domains: Wi-Fi · BLE · SDR · GPS · ADS-B · ISM
  • Status: WGU BSCSIA Capstone · Patent Pending
  • View Project →

AWS Cloud Control Pack

S3 default-deny · GuardDuty findings export · Scoped IAM mapped to CIS/NIST

Detection & IR Lab

Security Onion SIEM with TheHive/Cortex case management, custom detection rules, and IR playbooks.

  • Detection Content: Sigma-style rules · Alert tuning · False positive reduction
  • View Project →

AgenticOS

Deterministic AI agent orchestration with explainable routing and audit-grade logging.

  • Codebase: 6,361 lines Python · 72 health checks · 4 provider integrations
  • View Project →

Results

Metric Value
Production infrastructure security 7 years (USOG, 2017–2024)
Vulnerabilities remediated 15,000+
PCI-DSS endpoint hardening <48 hours with full evidence pack
Framework implementation CIS v8 → NIST CSF → SOC 2 across regulated environments
Client compliance delivered HIPAA · PCI-DSS · SOC 2 (healthcare, financial services, legal)
Active certifications 14

AAM / Cyber-Physical Differentiation

Few practitioners combine these:

  • USPTO-granted patents in UAV payload and delivery architectures
  • TraceLock™ — patent-pending 6-domain RF detection platform
  • FAA Part 107 certified · HAM/GMRS licensed
  • SDR/wireless expertise — RTL-SDR, HackRF, Kismet, spectrum analysis
  • USAF career veteran — mission-critical operations background
  • CEO of $5.6M drone logistics company — 7 years hands-on UAV engineering

Technical Expertise

Domain Skills
GRC & Frameworks CIS Controls v8 · NIST CSF · PCI-DSS v4.0 · SOC 2 · ISO 27001 · HIPAA
Cloud Security AWS IAM · S3 · GuardDuty · CloudTrail · Policy-as-Code
Detection Engineering Security Onion · TheHive/Cortex · Sigma · SIEM tuning · RF threat detection
Automation Python · n8n · CISO Assistant · Evidence pipelines · Webhook security
RF/Wireless RTL-SDR · HackRF · Kismet · BLE · ADS-B · SDR signal analysis

Credentials

Active (14)

Security+ · CySA+ · CSAP · PenTest+ · CNSP · CNVP · Network+ · A+ · ITIL 4 · ISC² SSCP (Assoc.) · LPI · Project+ · CSIS · CIOS

Planned (2026)

AWS Cloud Practitioner · ISC² CCSP

Education

B.S. Cybersecurity & Information Assurance — Western Governors University, March 2026 Capstone: TraceLock™


Actively Seeking

Category Details
Target Roles Security Architect · GRC Engineer · Cloud Security Engineer · Detection Engineer
Availability Available now
Work Style Remote-first · Async-ready · Distributed team experience
Location US-based · Remote US/EU/International welcome
Engagement W-2 · Contract · Consulting — 1099 available for international

Best fit for teams that need implementation, not just policy decks.


Connect

Channel Link
Email career@pharns.com
Portfolio portfolio.pharns.com
LinkedIn linkedin.com/in/pharns
Certifications Credly

Security architect/operator who turns governance into implemented controls, telemetry, and evidence. US Citizen · USAF veteran · Open to remote roles worldwide.

Pinned Loading

  1. giap-public giap-public Public

    Public-safe overview of a GRC intake automation platform (multi-framework, audit-ready). Demo: portal.aamcyber.work/demo

  2. tracelock-public tracelock-public Public

    Public-safe overview of TraceLock™ — patent-pending multi-domain RF threat detection platform (Wi-Fi/BLE/SDR/GPS/ADS-B). Detection engineering with Python automation and forensic-grade logging.

  3. baseline-evidence-drop baseline-evidence-drop Public

    Consent-driven evidence collection with hashing and control mapping (redacted).

  4. detection-rules detection-rules Public

    Custom Sigma-style detection rules for SIEM platforms — DNS tunneling, HTTP anomalies, lateral movement, authentication attacks, and exfiltration. 12 rules across 5 categories.

  5. AgenticOS AgenticOS Public

    Deterministic AI agent orchestration framework — explainable routing, audit-grade logging, and governed execution across multiple LLM providers.

    Python

  6. aws-guardrail-pack aws-guardrail-pack Public

    Minimal AWS guardrails (S3 block, CloudTrail, GuardDuty, Security Hub) with audit-ready outputs.

    HCL