Security monitoring, SIEM, and log analytics
- IBM QRadar: security event visibility and investigation workflows
- Wazuh: host and security monitoring patterns
- OpenSearch / Elasticsearch ecosystem: log search and analytics
- Kibana: dashboards and operational visibility
- Winlogbeat / Filebeat: log shipping from Windows and diverse sources
- rsyslog: Linux log aggregation and forwarding
Metrics, alerting, and observability
- Prometheus: metrics collection
- Alertmanager: alert routing and operational alerting discipline
Backup, recovery, and resilience
- Veeam: backup, validation, replication, failover, failback, DR planning context
Automation, IaC, and delivery
- Terraform, Azure DevOps, Ansible
- Python, Bash: scripting for operations and security workflows
Secrets and privileged access tooling
- Delinea Secret Server: vault-style secret handling in automation and infrastructure
Infrastructure and platforms
- Windows and Linux administration
- VMware, enterprise servers, storage, networking
- Platforms supported in operations: Apache Airflow, Microsoft SQL Server, TDV Server, OpenSearch/Kibana, web stacks including Nginx
GitHub and public artifacts
Pin repositories that demonstrate automation, monitoring, or security-relevant tooling; point your GitHub profile README to this site. Replace placeholders below when ready, do not invent projects.
- [Repository], description + link
Writing and third-party bylines
List talks and articles with correct byline Richard Craig Lissaman and link to canonical posts here when policy allows. See the blog.
FAQ
-
Does listing a vendor mean official partnership?
No. It means hands-on experience in context-appropriate deployments, unless you hold a formal partnership you choose to disclose.
-
Can you help us standardize on one stack?
Often the goal is fit and sustainability for the SMB, not logo bingo. We align tooling to risk, budget, and internal skills.