> ./execute_threat_intel.sh

Intelligence-Driven Security.

I am a Cloud Security Analyst (GCLD) and DarkNet Researcher turning threat intelligence into offensive action. Leveraging real-world breach data to build AI-enhanced reconnaissance tools and harden cloud infrastructures.

View Operations

About Me

I am a Cloud Security Analyst and DarkNet Researcher specializing in threat actor tracking and cloud infrastructure hardening. With a background in GRC and HIPAA compliance, I bridge the gap between regulatory requirements and technical defense. My work involves analyzing dark web breach data to identify emerging TTPs, which directly informs the automated tools and security controls I build.


Certifications:

  • SANS GIAC GCLD (Cloud Security Essentials)
  • SANS GIAC GSEC (Security Essentials)
  • SANS GIAC GFACT (Foundations)
  • CompTIA Security+
Threat Intelligence Dark Web Monitoring Cloud Security (AWS/Azure/GCP) Python Automation Stealer Log Analysis OSINT OWASP LLM Top 10 Prompt Injection AI-Assisted Dev GRC/HIPAA

Projects & Operations

Red Team Recon Agent

An automated reconnaissance framework that aggregates OSINT data to identify attack surfaces. Feature: Integrated LLM analysis to auto-generate executive threat summaries from raw scan data.

OpenAI API Python Automation OSINT

View Source Code >

AI-Enhanced Network Scanner

A multi-threaded port scanner utilizing raw sockets for rapid enumeration. Includes an AI-driven post-processing module that correlates open ports with likely vulnerabilities (CVEs).

AI Integration Socket Programming Networking Python

View Source Code >

AWS Account Manager

A cloud automation tool built with Boto3 to streamline IAM user management and enforce security policies.

Focus: Automating account provisioning while maintaining strict adherence to least-privilege principles.

AWS Boto3 IAM Security Cloud Automation GCLD

View Source Code >

Stealer Log Detector

A threat intelligence tool designed to scan unstructured logs for indicators of compromise (IOCs).

Key Capability: rapid identification of exposed credentials and session tokens from dark web data dumps.

DarkNet Intel Forensics Threat Hunting Python

View Source Code >

Project AETHER: Distributed AI

A distributed "Hive Mind" robotics system separating mobile edge agents (Petoi Bittle) from heavy compute (Jetson Orin).

Capabilities: Autonomous SLAM mapping, RF signal triangulation ("Fox Hunting"), and local LLM voice control via ROS2.

ROS2 / K3s NVIDIA Isaac Edge AI SIGINT

View Project Repository >

Resume

Currently available for roles in Cloud Security, Threat Intelligence, Vulnerability Assessment, and Junior Penetration Testing.


Download PDF Resume

Establish Comms

Interested in collaboration or security consultation?

Email: joyce.cyberanalyst [at] gmail.com

LinkedIn: linkedin.com/in/joyce-a-johnson

GitHub: github.com/joieux

PGP Public Key (Fingerprint):

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=Ozsv
-----END PGP PUBLIC KEY BLOCK-----
        

⚠️ Security Advisory (Dec 2025): This key is provided for identity verification and legacy compatibility. I am aware of the parsing vulnerabilities presented by 39c3 regarding GnuPG and Sequoia. Please ensure your local PGP parser is patched and verified before use.