Carson Mulder

BlueSky Internship • Rotation III • Cybersecurity • Data • Software

Professional Vision & Goals

I aim to build secure, reliable systems by combining incident response discipline with data-driven decision making. My short-term focus is earning a role as a Security Analyst / SOC or Data Analyst, while developing automation that shortens the path from detection to recovery.

Quick Facts

  • ETSU • B.S. Computer Science • Expected 2026
  • BCBST • Enterprise Technology Solutions Intern (Summer 2024)
  • Focus: Incident Response, Threat Hunting, Windows Forensics
  • Data: Python, Power BI, ArcGIS • Visualization & storytelling

Mission & Vision

Mission

Deliver reliable, observable, and secure systems by applying incident response best practices and analytics to reduce risk, improve response times, and enable continuous learning for teams.

Vision

Become a security engineer who designs automation and playbooks that bridge detection to recovery, mentors junior analysts, and helps organizations make evidence-based decisions at scale.

Values & Strengths

Reliability

Operational calm from FOH sound engineering—clear comms, fast triage, and stable outcomes under pressure.

Evidence-Driven

Let logs, timelines, and dashboards tell the story; transform noise into decisions.

Builder Mindset

From IR playbooks to BI dashboards—ship small, improve continuously.

Discipline

Target archery focus—repeatable form, measurable progress, consistent execution.

SMART Career Goals

1) Analyst Foundations

Specific: Complete 2 SOC/IR or Windows forensics labs per week and capture a brief write-up.
Measurable: ≥8 labs per month + 8 summaries (private notes or blog).
Achievable: Leverage TryHackMe/labs and course materials.
Relevant: Aligns to Security Analyst/SOC roles.
Time-bound: Maintain cadence through the semester.

  • [ ] Week 1–2: 4 labs + 4 short summaries
  • [ ] Week 3–4: 4 labs + 4 short summaries
  • [ ] Add highlights to Professional Artifacts

2) IR Automation Mini-Tool

Specific: Build a Python CLI that parses logs, enriches IOCs, and exports a timeline (CSV/JSON).
Measurable: 1 CLI + README + sample dataset + before/after example.
Achievable: Use Python stdlib + public IOC sources.
Relevant: Demonstrates detection-to-analysis acceleration.
Time-bound: MVP and docs before final portfolio submission.

  • [ ] Week 1: Parse + normalize events
  • [ ] Week 2: IOC enrichment + CSV export
  • [ ] Week 3: README, demo, add to Internship Projects

3) Security Data Storytelling

Specific: Build a Power BI dashboard for a public security dataset (alerts/incidents) and present 3 insights.
Measurable: 1 PBIX (or screenshots) + short write-up with recommendations.
Achievable: Use Python for cleaning; Power BI for visuals.
Relevant: Communicates findings to non-technical stakeholders.
Time-bound: Publish visuals and write-up mid-semester.

4) Incident Comms Checklist

Specific: Translate FOH live-ops practices into a 1-page “incident communications” checklist for security events.
Measurable: Checklist PDF + example scenario + reflection paragraph.
Achievable: Adapt existing IR/ops structures you’ve used.
Relevant: Improves clarity under pressure during incidents.
Time-bound: Complete before the portfolio mid-semester check-in.

Resume Professional Artifacts Internship Projects