Brian D'Hurieux

About

Brian D'Hurieux portrait

Hi, I’m Brian D'Hurieux., a network analyst and software developer with over 15 years of development experience and a strong focus on cybersecurity. I analyze network traffic, automate detection workflows, and build tools that make threat data easier to see and understand.

My background blends network forensics and full-stack development. I’ve worked on everything from packet capture analysis to building secure web applications that support large-scale awareness and defense efforts.

Projects

Network Analysis & Cyber Skills

Here's a glimpse into my network analysis and cybersecurity expertise:

Network Forensics

  • Packet Analysis: Wireshark, tcpdump, tshark
  • Traffic Monitoring: ELK Stack, Splunk, Security Onion
  • Threat Detection: Suricata, Snort, Zeek
  • Flow Analysis: NetFlow, sFlow, IPFIX

Incident Response

  • SIEM Platforms: Elastic Security
  • Automation: Python scripts, SOAR platforms, PowerShell, Node.js
  • Malware Analysis: Static & dynamic analysis
  • Digital Forensics: Memory dumps, disk imaging

Security Infrastructure

  • Firewalls: pfSense, Cisco ASA, Fortinet
  • IDS/IPS: Suricata, Snort configuration
  • Vulnerability Management: Nessus

Recent Projects

Threat Hunting Dashboard: Built real-time ELK stack dashboard for network anomaly detection with custom Kibana visualizations.

Resume

⬇ Download PDF

Brian D’Hurieux

Network Analyst | Full-Stack Developer | Threat Hunter

Summary

Full-Stack Developer and Network Forensic Analyst with an active TS/SCI clearance and GIAC GNFA and Security+ certifications, specializing in building security tools and analyzing network traffic. Proven ability to leverage full-stack development skills (Python, MERN-stack, Azure) to create enterprise-level applications and automation that enhance security posture and threat visibility.

Technical Skills
  • Security: ELK Stack, Arkime, Zeek, Wireshark, Cyber Threat Analysis, Security Simulation
  • Programming: Python, C#, JavaScript, HTML/CSS, MERN Stack, Git
  • Platforms/Tools: Unity, Power Apps, Power Automate
Experience
AT&T Research Labs — Cybersecurity Principal Aug 2021 – Present
  • Architected and developed the primary smishing/phishing simulation platform from inception to deployment, used to train and assess AT&T's entire national workforce.
  • Built custom internal tools and interactive dashboards to automate security awareness reporting, providing the CISO team with real-time visibility into program effectiveness and user risk trends.
  • Designed and developed full-stack, Azure-hosted internal web applications handling features like user authentication, async document processing, and real-time interactivity for thousands of participants.
Air National Guard — Cyber Warfare Operator Jun 2021 – Present
  • Conduct proactive threat hunting and network forensic analysis by writing custom queries in Kibana and parsing Zeek logs to identify anomalous activity and potential IOCs on DoD networks.
  • Utilize Arkime (formerly Moloch) for deep packet inspection and Wireshark for protocol analysis to investigate security incidents and reconstruct malicious network traffic.
AT&T Research Labs — Senior Software Developer (Contractor) Sep 2018 – Aug 2021
  • Led the end-to-end development of immersive cybersecurity training games and simulations, translating complex security concepts (social engineering, network intrusion) into engaging, interactive experiences for corporate-wide awareness initiatives.
  • Engineered a scalable 3D “Smart City” simulation environment in Unity (C#), occasionally hosting internal CTF events, portraying cyber-physical attacks on critical infrastructure like power grids and traffic systems.
  • Designed and delivered high-traffic, interactive web applications for major internal security conferences, utilizing JavaScript and cloud services to handle thousands of concurrent users and significantly increase engagement with security content.
All Things Media — Interactive Media Developer Mar 2010 – Jun 2016
  • Developed and launched cross-platform interactive applications and augmented reality (AR) tools from concept to deployment, serving educational and promotional objectives for a diverse client base.
  • Architected large-scale, multi-platform interactive applications for Fortune 500 clients including Pearson Education, Mercedes-Benz, and Toys “R” Us, managing the full software development lifecycle to meet strict deadlines and performance requirements.
Education
  • The Art Institute of Philadelphia — B.S., Media Arts (Interactive Media/Programming) · 2007–2009 · focused on app development, 3D systems, interactive systems, and programming logic
  • Community College of the Air Force — Electrical/Electronics & Integrated Avionics Systems · 2014–2015
  • Supplemental STEM Coursework (2014–2016): Ramapo College (Calculus I & II, Chemistry I); Rockland Community College (Engineering Physics I & II); Pennsylvania College of Technology (Computer Science, no degree conferred)
Certifications
  • TS/SCI Clearance (Active)
  • GIAC Network Forensic Analyst (GNFA)
  • CompTIA Security+

Contact

Notice: Some site features may be blocked by your corporate network or security settings. If you experience missing functionality, try accessing from a personal device or network.
BD Terminal