Skip to content
View jkgibson-source's full-sized avatar

Block or report jkgibson-source

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jkgibson-source/README.md

👋 Hey, I’m J.K. Gibson

Transitioning into cybersecurity after a 25-year career in high-stakes safety, I now build hands-on lab environments to simulate attacks, improve detection, and strengthen real-world defense.


🔐 About Me

After more than two decades as a professional acrobat, rigger, and coach, safety, precision, and risk management have been at the core of everything I do. Today, I’m channeling that same mindset into cybersecurity—approaching problems from both the attacker and defender perspectives.

I’m focused on developing purple team capabilities, combining offensive testing with defensive analysis to better understand how attacks succeed and how they can be detected, mitigated, and prevented.


🧪 What I’m Working On

  • Building and refining a multi-machine cybersecurity home lab ("The Burrow")
  • Designing realistic attack + detection simulations across multiple phases (baseline, monitored, and evasive)
  • Practicing both offensive techniques and defensive analysis in controlled environments
  • Conducting OSINT investigations in ethical, structured scenarios

🎯 Current Focus

  • Improving detection visibility in multi-phase attack scenarios
  • Expanding evasion testing techniques
  • Strengthening SIEM analysis workflows

🚀 Featured Project

🦂 The Burrow – Cybersecurity Home Lab

A fully built, continuously evolving home lab designed to simulate real-world attack and defense scenarios.

🔍 Includes:

  • Multi-system attack environment (Kali, macOS, Parrot OS)
  • Centralized logging and monitoring (SIEM + endpoint visibility)
  • Detection testing with and without defensive controls
  • Evasion testing scenarios to simulate advanced threats

👉 Explore the full lab → https://github.com/jkgibson-source/cybersecurity-home-lab


🦂 Detection Engineering Pentest — macOS Big Sur

Designed and executed a multi-phase purple team engagement in a custom home lab to evaluate detection capabilities against realistic attack scenarios on macOS Big Sur. Identified a critical gap where endpoint and SIEM tools failed to detect user-driven attacks—not due to misconfiguration, but because OS-level privacy controls (TCC/SIP) prevented access to required telemetry. Demonstrated that effective detection engineering depends on data visibility, not just tooling, and produced a full MITRE-mapped case study highlighting platform-imposed observability constraints.


🧠 Mindset

  • Relentless learner
  • Curious and hands-on
  • Thinks in both attacker and defender perspectives
  • Focused on practical, real-world skill development

📫 Let’s Connect

I’m actively working toward a role in cybersecurity with a focus on SOC analysis and purple team operations.

If you’re a hiring manager, mentor, or fellow learner—feel free to connect or reach out.


⚡ Fun Fact

I spent 25 years performing and coaching in high-risk physical environments—now I apply that same discipline to navigating risk in the digital world.

Popular repositories Loading

  1. cybersecurity-home-lab cybersecurity-home-lab Public

    Documentation of my cybersecurity home lab - penetration testing, digital forensics, network analysis, and SIEM monitoring

    Python

  2. jkgibson-source jkgibson-source Public