Pipeline health check.
Raylee Hawkins
This is a working security operations system, not a static portfolio.
I built and operate SignalFoundry — a 35-script Python pipeline that ingests Wazuh alerts, performs policy-driven triage, and publishes redacted escalation packs. 210 detection rules across Sigma, Wazuh, and Splunk, plus 10 IR playbooks. Every metric is CI-verified. Every claim is reproducible.
Sept 2025: zero computer experience. Mar 2026: 324,074 verified cases processed, live pipeline processing on cadence. Previous career: production supervisor — 30+ operators, IATF audit compliance, mandatory 12-hour shifts. The domain changed. The discipline didn't.
Available for SOC / Detection roles
Every alert passes through this system.
SignalFoundry
Wazuh alerts in → policy-driven triage → mandatory redaction → evidence packs → reconciliation gate → published proof. 35-script Python pipeline. Deterministic. Nothing publishes without PASS.
How alerts become evidence
Every alert enters the same pipeline. Most are auto-closed. The rest produce structured evidence packs.
What the pipeline watches for
210 detection rules across 4 platforms, mapped to MITRE ATT&CK (+ 10 IR playbooks). Full searchable inventory →
MITRE-mapped behavioral detections across tactic folders: process creation, lateral movement, credential access, persistence, and more.
Custom rule IDs (100000+ range), deployed to Wazuh Manager. Lab-validated with detection harness.
7-step structured response: detect, triage (5 min), investigate (30 min), contain, eradicate, recover, document.
Investigation queries against Wazuh-forwarded events. Home lab scope — not enterprise deployment.
Pipeline integrity
Locked snapshot from data/truth/current-authority.json. These values do not change from live telemetry. Full proof →
- Public benchmark snapshot: reviewer-authoritative values from
data/truth/current-authority.json. - Runtime snapshot: informational telemetry remains subordinate and is disclosed on /proof.
- Generated at: LOCKED
- Source artifact:
site/data/truth/current-authority.json
All endpoints reporting.
Analyst-ready evidence packs.
0 mismatches between stages.
Snapshot date.
Source: /assets/data/ops-metrics.json · Locked: 04-07-2026 · Full verification →
Public benchmark snapshot · Runtime snapshot · Generated at 04-07-2026 · Source artifact /assets/data/ops-metrics.json
Manufacturing discipline, applied to security
I didn't break into cybersecurity. I transitioned operator discipline from automotive manufacturing into detection engineering. The systems instinct predates the portfolio.
- Fehrer Automotive — Team Lead, A/B/I lines. Mercedes, BMW, VW, Tesla. IATF 16949 / TISAX. Promoted in under 5 months.
- Unipres Alabama — Team Lead Supervisor, hot stamp + laser for Nissan. Schuler 16,000 kN press. ISO 9001. Mandatory 12-hour shifts.
- Carrington Foods — Quality Control, Tier-1 U.S. Armed Forces supplier. SQF Ed. 9 "Excellent" / Platinum Award.
- Sept 2025: Zero computer experience.
- Dec 2025: Left Unipres. Started AI Model Evaluator role (detection, scripting, security reasoning).
- Mar 2026: Automated pipeline. Verified public benchmark. 210 detection rules + 10 IR playbooks. Anthropic MCP + Claude API certified.
- Result: SignalFoundry — built during mandatory 12-hour shifts.
Quality gates, process control, escalation handling, reconciliation against spec, audit-ready documentation.
Quality gates, policy-driven triage, escalation handling, reconciliation against truth, verified proof artifacts.
Verify it yourself
Every claim on this site traces back to a verification command. Clone the repo and run these:
Where to go next
Pick the path that answers your decision fastest.
Enterprise Security
Audit policy hardening, lab infrastructure, baseline comparison, GPO deployment.
SignalFoundry
Flagship system architecture, triage logic, outputs, and recovery model.
Race Condition Recovery
TOCTOU race at 505K-file scale. Diagnosed, fixed with 20 lines, verified under live load.
Case Studies
15+ engineering case studies: incident response, detection audits, threat hunts, and infrastructure work.
Proof
Stable benchmark source, evidence trail, and verification path.
Resume
Role fit, outcomes, and recruiter-ready resume formats.