Cybersecurity Built for
Those Who Protect
the Public

Government agencies face adversaries that don't wait for budget cycles or procurement windows. Admirable Cybersecurity bridges that gap — delivering field-proven training and operational services drawn from the front lines of private sector threat research, directly to the teams that protect public institutions.

Federal Agencies
State & Local Government
Military
Law Enforcement
Our Mission

Protecting Those Who Serve the Public Interest


Admirable Cybersecurity was founded with a singular purpose: to elevate the security posture of government and public sector organizations through disciplined training and rigorous operational practice.

Government agencies face adversaries that are persistent, well-resourced, and strategically motivated. Our team brings private sector speed and innovation to public sector defense — closing the gap between emerging threats and institutional readiness.

15+
Years of Cybersecurity Experience
Government
Federal · State & Local · Military
What We Offer

Operational Cybersecurity Services

Practical cybersecurity services for organizations where the stakes are real.

Training

Practitioner-led cybersecurity training built around real-world scenarios. From AI-assisted SOC operations to enterprise attack methodology, our courses equip teams with skills they can apply immediately.

Investigations

Structured cybersecurity investigations for government and public sector organizations. We bring analytical rigor and operational discipline to complex intrusion cases, insider threats, and adversarial campaigns.

Forensics

Digital forensics support for incident analysis, litigation readiness, and evidentiary chain-of-custody requirements. We produce defensible findings that hold up under scrutiny.

Current Offerings

Training Programs

We train active security practitioners, IT professionals expanding into security, and those making a full transition into the field — all with the same hands-on, practitioner-led approach.

AI + SOC 101 Bootcamp: Building Modern Security Operations Skills with AI Integration

A two-day intensive bootcamp positioning analysts at the forefront of AI-assisted SOC operations. Covers agentic AI tooling, SOC analyst workflows, and live threat hunting with modern toolchains.

AI-Driven Defensive Cybersecurity: One-Day Intensive Workshop

A focused single-day course on applying AI tools to blue team operations. Designed for analysts, SOC leads, and defenders who want practical AI integration skills they can use the next day.

Hacking The Enterprise

An adversarial training course covering enterprise attack methodology across infrastructure, web applications, and cloud environments. Learn how attackers think — and how defenders can get ahead of them.

Rod Soto
Founder · Principal Engineer · AI Security Researcher

Rod Soto is a detection engineer and security researcher specializing in AI/LLM threat detection, agentic system security, and SOC modernization. He brings over 15 years of hands-on experience bridging offensive security research and enterprise-scale defensive operations, currently as part of the Splunk Threat Research Team at Splunk Cisco.

Rod has delivered training at DEF CON, HackMiami, and other major industry venues, building curriculum around practical skills at the intersection of AI, security operations, and real-world threat scenarios.

Beyond the classroom, Rod actively publishes open-source security tooling — including TA-Ollama, a Splunk MCP Technology Add-on with OWASP Top 10 LLM detections, and the Agentic LLM MCP Threat Emulator — all available on GitHub and Splunkbase. He has presented research at Black Hat Arsenal and spoken at DEF CON, RSA Conference, Black Hat, HackMiami, DerbyCon, Splunk .CONF, BSides, ISSA, ISC2, OWASP, and Underground Economy, an invitation-only practitioner forum.

His career spans senior roles at Prolexic, Akamai, Caspida, and Splunk/Cisco, and he has contributed to large-scale security education through Udacity's Security Engineer Nanodegree.

CTF Winner — Black Hat Las Vegas 2012
CTF Winner — Red Alert ICS CTF DEF CON 2022
Cyber Auxiliary Volunteer — U.S. Marine Corps
Get in Touch

Contact Us


For training inquiries, investigations, forensics engagements, or speaking requests, reach out directly. We respond within one business day.

Email
info@admirablecyber.com
Base of Operations
South Florida · National Coverage
Web
admirablecyber.com