Good content does the work for you — when clients read what you publish, they’ll understand what you offer, what makes you unique, and why you’re the one to trust with the job they need to get done.
The hard part is finding someone to write that good content. You need more than a writer: you need a cybersecurity subject matter expert, a conversationalist, a researcher, an editor. You need someone who translates tech speak to plain English. You need someone in tune with your target audience, whether CISO, SOC manager, or small business owner. You need someone who knows what questions to ask and how to find the answers.
What if you’ve found that someone today?
Cybersecurity content by a former engineer
If you choose me as your freelance cybersecurity writer, you’ll get someone with over 10 years of technical experience in both private and public industry. I’ve personally:
- written assembly (x86)
- monitored IT systems within a SOC (Splunk)
- analyzed vulnerabilities in source code (C++, Java), and
- built machine learning-based analytics to find anomalies in network traffic (Python).
You’re also getting a former user experience designer (at FireEye, now Trellix) and engineering manager: someone who pitched projects and made products that work — for managers and analysts alike.
And finally, you’re getting an experienced, professional writer who understands the goal of great communication: connecting businesses like yours to the people who need your expertise.
Cybersecurity areas of expertise
Topics I write about include:
- security operations / threat hunting
- endpoint / network security
- information technology / cyber hygiene
- cloud security / mobile security
- authentication / zero trust
- critical infrastructure / internet of things
- malware / reverse engineering
- vulnerability analysis / penetration testing
- compliance / regulations
- frameworks / defense in depth
- machine learning / artificial intelligence
- talent acquisition / career development
Sample cybersecurity work
Take a look at some of my recent cybersecurity writing. To see ghostwritten content, contact me for the password.
Blog posts:
- Securing Your Cloud Networks: Strategies for a Resilient Infrastructure (AT&T Cybersecurity)
- How to Strengthen Your Insider Threat Security (IT Security Guru)
- A Brief History of Data Loss Prevention (Cyber Security Review)
- Building a Robust Cybersecurity Framework (Techspective)
- Questions to Ask Before Committing to a DLP Solution (Latest Hacking News)
Web copy:
- Vulnerability Assessment (Texaport)
- Cyber Security Consultancy (Texaport)
- Multi-Factor Authentication (Zulukey)
White papers:
Get in touch
If you think we’d be a good fit, send me a message! I’d love to hear what you’re thinking.