Security Engineer · SOC Automation · Threat Intel
George Taylor
# building pipelines that respond to threats automatically
🛡️
WAZUH CLUSTER
Detection layer
Wazuh Manager
Kafka broker
OpenSearch
🐍
PYTHON
Automation
⚙️
GH ACTIONS
CI/CD pipeline
📋
JIRA
Ticket creation
🌐
NGINX
Web & proxy
about.py
class SecurityEngineer:
  name = "George Taylor"
  location = "Largo, Florida"
  focus = "SOC automation, threat intel pipelines, detection engineering"
  skills = ["Wazuh", "Python", "GitHub Actions", "Kafka", "OpenSearch", "Nginx"]
  # I build pipelines that turn threat intel into action — automatically.
projects.sh
CISA KEV → Jira Pipeline production
Monitors the CISA Known Exploited Vulnerabilities catalog daily. Auto-creates Jira tickets for new CVEs via GitHub Actions. State-tracked, deduplicated, severity-filtered.
# Python · GitHub Actions · Jira API · CISA KEV JSON feed
URLhaus Threat Intel Monitor production
Pulls malicious URL feed from abuse.ch URLhaus. Creates Jira tickets for new threats automatically. Same pipeline pattern applied to a second threat intel source.
# Python · GitHub Actions · URLhaus API · Jira API
Wazuh XSS Detection Rules deployed
Custom Wazuh rules for CWE-79 XSS detection. Monitors web server logs for injection attempts across reflected, stored, and DOM-based vectors.
# Wazuh · OSSEC rules · Apache/Nginx log parsing
gtaylor-infosec.com Infrastructure live
This site. DigitalOcean droplet, Nginx reverse proxy, Let's Encrypt SSL, Cloudflare DNS. Recruiter access logging via Formspree.
# Nginx · Let's Encrypt · Cloudflare · DigitalOcean · Ubuntu 24.04
live_stats.json
CVEs tracked
1,599
Tickets created
11
Feeds active
2
Uptime
100%
george@gtaylor-infosec:~$ tail -f pipeline.log
[SUCCESS] CVE-2026-45498 → SCRUM-11 created · Microsoft Defender
[SUCCESS] CVE-2026-41091 → SCRUM-10 created · Microsoft Defender
[SUCCESS] CVE-2010-0806 → SCRUM-9 created · Internet Explorer
[INFO] Pipeline running daily · GitHub Actions · georgetaylor551/security-portfolio
[INFO] Next run: 08:00 UTC_
recruiter.md
# leave your details to access the full GitHub portfolio
[SUCCESS] access granted · logged
github.com/georgetaylor551