Skip to content
View eddietorial's full-sized avatar

Block or report eddietorial

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
eddietorial/README.md

Hi, this is Geoff

API Security & Integration Specialist | Cybersecurity Automation


About

I have 15+ years of experience in cybersecurity and IT automation, specializing in building RESTful API integrations that strengthen defenses, accelerate incident response, and connect security tools at scale.

My work includes creating API automation frameworks that reduce manual effort, orchestrating cross-platform security workflows, and embedding OWASP API Security Top 10 practices into every integration. I have led teams to improve incident response efficiency, automate SOC workflows, and deliver secure, scalable API solutions for vulnerability management and threat intelligence.

Core strengths: API security design, OAuth and authentication, workflow automation, incident response, and SIEM engineering. I translate complex security needs into reliable, API-driven architectures that enable faster detection and smarter decisions.

Focused on advancing API security and automation to help organizations protect data, respond to threats, and integrate AI-ready security platforms.

  • API Integration & Orchestration: RESTful APIs, API-driven workflow automation, cross-platform security tool integration, scalable API frameworks.
  • API Security: OWASP API Security Top 10, OAuth, secure authentication and authorization, secure API design and consumption.
  • Automation & Scripting: Workflow automation, incident response orchestration, process optimization using APIs and scripting.
  • Security Operations: Incident detection and response, vulnerability management automation, log correlation and analytics.
  • Risk & Compliance: Risk assessment, security governance, and controls mapping to cybersecurity frameworks.
  • Consulting & Analytical Skills: Translating complex technical issues into actionable recommendations for stakeholders.

Connect with Me


Popular repositories Loading

  1. eddietorial eddietorial Public

  2. test-public-repo test-public-repo Public

    Python