INFOSEC • GRC • PRIVACY

Terrell Grenyion

Security Analyst with 3+ years of experience supporting SOC 2 compliance, risk management initiatives, and security policy development. Strong GRC focus backed by hands-on SOC Level II experience, enabling practical, execution-driven risk assessments and control recommendations.

Houston, TX Phone: 561-876-7766 View Phone terrell@grenyionadvisory.com LinkedIn

Current Focus

  • Security Analyst @ Cybriant
  • GRC & Cybersecurity Support @ CyberPeace Institute
  • MS Information Systems @ Kennesaw State University
  • Actively pursuing Google Professional Cloud Security Engineer, CISA & CIPP/US

Core Domains

Risk Assessments • GRC • Privacy • SIEM • Incident Response

Education

  • Kennesaw State University
    Master of Science (Information Systems)
  • Kennesaw State University
    Graduate Certificate (Information Security & Assurance)
  • Kennesaw State University
    Bachelor of Science (Cybersecurity)

Certifications

  • CompTIA Cybersecurity Analyst (CySA+) ce
  • CompTIA Security+ ce
  • Google Cloud Professional Security Operations Engineer
  • SentinelOne Core Support Professional
  • Cisco Introduction to Cybersecurity

Credly Badges

Experience

Security Analyst

Cybriant Aug 2024 – Present
  • Contribute to governance initiatives through policy (e.g. Change Management Policy, Endpoint Security Configuration and Protection Modification Policy) & procedure recommendation and development (e.g., SOAR Change Management Procedure, Client Risk Acceptance Waiver Template, Disabling Agents in SentinelOne, Changing User Permissions in SentinelOne, and Exclusion Management in SentinelOne)
  • Lead incident investigations using SIEM, EDR, and SOAR platforms (SentinelOne, Google SecOps, Azure Sentinel).
  • Engaging security awareness training development (Mock Phishing Campaigns, Jeopardy Style Security Trivia, Review of common IOCs from recent attack trends from previous quarter), and alignment with regulatory and client requirements (CMMC & SOC2
  • Lead incident investigations using enterprise SIEM, EDR, and SOAR platforms (SentinelOne, Google SecOps/SOAR, Azure Sentinel, AlienVault, NetEnrich, Seceon).
  • Support incident response operations, including containment, remediation coordination, and development of playbooks and post-incident documentation (also took charge of what we call “enhanced monitoring” where we pay special attention to client environment directly, not utilizing SOAR platforms, providing daily updates and immediate response on any suspicious indications/flagged activity, followed by verification by phone or Teams with the client).
  • Manage security tickets and client inquiries (Zoho Suite and ConnectWise ticketing systems), deliver technical analysis, actionable recommendations, and clear stakeholder communication (through phone, Microsoft Teams, and messaging/tickets).

Technical Account Manager

Cybriant Apr 2023 – Aug 2024
  • Delivered cybersecurity recommendations aligned with client risk, operations, and regulatory requirements.
  • Supported identification and upsell of security services, strengthening client security maturity and relationships.
  • Built and delivered weekly client security reports, including alert volume summaries, open tickets, environment health checks, anomaly detection, and alert/event trend analysis.
  • Acted as a liaison between clients, Sales, Engineering, and SOC teams to manage requests, resolve issues, and deliver tailored security services.

Academic & Applied Experience

  • Developed GRC and security deliverables including vulnerability assessments, enterprise policies and procedures, business impact analyses (BIA), SIEM evaluations, and incident response reports through graduate coursework and projects.
  • Gained hands-on experience using Clearwater IRM for risk and compliance analysis, including asset inventories, risk modeling, risk scoring, and defined risk response strategies.
  • Designed and documented network security architectures, including firewall configurations, VPN implementations, and secure remote access strategies with cost–benefit analysis.
  • Conducted tabletop incident response exercises and produced formal after-action (hot wash) reports identifying gaps, risks, and remediation recommendations.
  • Authored a white paper on AI Governance, Risk, and Compliance titled “Building a Framework for Responsible Enterprise AI,” analyzing regulatory gaps and proposing a practical governance framework (also published as a professional article).
  • Exposure to key frameworks including NIST CSF, NIST SP 800-53, and MITRE ATT&CK, with additional independent study of NIST SP 800-82, NIST SP 800-63, TSA Security Directives, and MTSA.

Skills & Abilities

GRC Risk Assessments Policy & Procedure Development SOC Operations Incident Response SIEM SOAR Threat Hunting Audit Support Compliance Frameworks

Additional Information

  • Languages: English (Native)
  • Availability: Open to on-site, hybrid, and remote projects and collaborations
  • Security Clearance: Eligible for security clearance

Interested in working together on InfoSec, GRC, risk, or privacy initiatives?

Get in Touch