Government agencies face adversaries that don't wait for budget cycles or procurement windows. Admirable Cybersecurity bridges that gap — delivering field-proven training and operational services drawn from the front lines of private sector threat research, directly to the teams that protect public institutions.
Admirable Cybersecurity was founded with a singular purpose: to elevate the security posture of government and public sector organizations through disciplined training and rigorous operational practice.
Government agencies face adversaries that are persistent, well-resourced, and strategically motivated. Our team brings private sector speed and innovation to public sector defense — closing the gap between emerging threats and institutional readiness.
Practical cybersecurity services for organizations where the stakes are real.
Practitioner-led cybersecurity training built around real-world scenarios. From AI-assisted SOC operations to enterprise attack methodology, our courses equip teams with skills they can apply immediately.
Structured cybersecurity investigations for government and public sector organizations. We bring analytical rigor and operational discipline to complex intrusion cases, insider threats, and adversarial campaigns.
Digital forensics support for incident analysis, litigation readiness, and evidentiary chain-of-custody requirements. We produce defensible findings that hold up under scrutiny.
We train active security practitioners, IT professionals expanding into security, and those making a full transition into the field — all with the same hands-on, practitioner-led approach.
A two-day intensive bootcamp positioning analysts at the forefront of AI-assisted SOC operations. Covers agentic AI tooling, SOC analyst workflows, and live threat hunting with modern toolchains.
A focused single-day course on applying AI tools to blue team operations. Designed for analysts, SOC leads, and defenders who want practical AI integration skills they can use the next day.
An adversarial training course covering enterprise attack methodology across infrastructure, web applications, and cloud environments. Learn how attackers think — and how defenders can get ahead of them.
Rod Soto is a detection engineer and security researcher specializing in AI/LLM threat detection, agentic system security, and SOC modernization. He brings over 15 years of hands-on experience bridging offensive security research and enterprise-scale defensive operations, currently as part of the Splunk Threat Research Team at Splunk Cisco.
Rod has delivered training at DEF CON, HackMiami, and other major industry venues, building curriculum around practical skills at the intersection of AI, security operations, and real-world threat scenarios.
Beyond the classroom, Rod actively publishes open-source security tooling — including TA-Ollama, a Splunk MCP Technology Add-on with OWASP Top 10 LLM detections, and the Agentic LLM MCP Threat Emulator — all available on GitHub and Splunkbase. He has presented research at Black Hat Arsenal and spoken at DEF CON, RSA Conference, Black Hat, HackMiami, DerbyCon, Splunk .CONF, BSides, ISSA, ISC2, OWASP, and Underground Economy, an invitation-only practitioner forum.
His career spans senior roles at Prolexic, Akamai, Caspida, and Splunk/Cisco, and he has contributed to large-scale security education through Udacity's Security Engineer Nanodegree.
For training inquiries, investigations, forensics engagements, or speaking requests, reach out directly. We respond within one business day.