About Us

20 YEARS
BUILDING.
10 YEARS
HUNTING.

Shadow Signal Group isn't a vendor. We're a security partner built from two decades of real-world IT and threat intelligence experience — the kind that only comes from doing the work.

The Story

Shadow Signal Group was founded by a senior security analyst with over 20 years in the IT industry — spanning enterprise helpdesk, identity and access management, SMB technical deployment, and corporate-level security operations.

Before moving into security, our founder spent years in Hawaii working for Altres as a Technical Trainer — personally onboarding small and medium-sized businesses across every island. That meant walking in the door, assessing exactly what they needed, building their systems from scratch, and staying until everything worked. That same hands-on approach defines every Shadow Signal engagement today.

After returning to the mainland, a decade-long career in Security Operations and Insider Threat analysis followed — building detection logic, hunting threats, and protecting enterprise environments using the same tools Fortune 500 companies pay millions to staff. The difference is we bring that level of expertise directly to businesses that can't afford an internal SOC.

Shadow Signal Group is built on the belief that small businesses deserve enterprise-grade security intelligence — delivered by someone who knows your environment, speaks plain English, and shows up when it matters.

CAREER TIMELINE

HAWAII

Altres — Technical Trainer, SMB Onboarding

Onboarded small and medium-sized businesses across all Hawaiian islands. Needs assessment, system deployment, HR and time & attendance implementation.

APPLE

AppleCare — Corporate Call Coach

Top-tier certified specialist. macOS and Windows environments. Corporate-level technical support and coaching.

IAM

Identity & Access Management

Active Directory, SQL-based security group management, access provisioning and governance across enterprise environments.

SOC

Security Operations Center — 8 Years

Threat hunting, detection engineering, alert triage, and incident response across large enterprise environments.

ITM

Insider Threat Analysis — 2+ Years

Behavioral detection, OSINT investigations, counterintelligence tradecraft, and AI governance for enterprise programs.

TOOLS & EXPERTISE

Detection

Microsoft Defender XDR

Advanced threat hunting, KQL, endpoint detection and response across enterprise environments.

SIEM

Sentinel & Splunk

Log analysis, detection rule engineering, alert triage and tuning.

Email

Proofpoint ITM

Insider threat monitoring, email security, data loss prevention.

Endpoint

Tanium & Absolute

Endpoint visibility, asset inventory, remote management and control.

Identity

Active Directory & IAM

Access provisioning, security group management, offboarding controls.

OSINT

Open Source Intelligence

Maltego, behavioral analysis, identity verification, corporate mapping.

READY TO TALK?

30 minutes is all it takes to identify your top three risks — at no cost.

Get in Touch