Cyber Capability Architect

Alfredo “Red” Pelaez

Designing adversary-driven cyber experimentation systems that measure whether defensive cyber capabilities actually work under realistic conditions.

Why This Work Exists

A detection can look good in a demo and still fail when adversary tradecraft unfolds across host, network, and analytic layers. My work focuses on closing that gap through structured experimentation, telemetry-driven validation, and measurable defensive improvement.

Capability Areas

Adversary Emulation

Designing repeatable simulations that test defensive systems against realistic tradecraft and observable behavior.

Detection Engineering Validation

Evaluating whether host, network, and analytic telemetry produce timely and useful signal for defenders.

Cyber Experimentation Architecture

Building segmented environments where telemetry, detection logic, and workflow assumptions can be tested together.

AI-Enabled Cyber Analysis

Exploring how structured analytics and machine learning can support validation, interpretation, and defensive decision support.

Selected Work

OPFORGE

Adversary emulation and detection validation platform built to evaluate defensive performance across enterprise telemetry pipelines.

Explore OPFORGE →

Tactical Validation & Assessment

Mission-focused work centered on measuring how defensive cyber capabilities perform when exposed to realistic adversary tradecraft.

View project summary →

Validation Methodology

A practical framework linking adversary behavior, telemetry capture, detection evaluation, and defensive improvement.

Read methodology →

Leadership & Workforce Development

Technical work has the greatest value when it strengthens teams, develops operators, and helps create more capable defenders over time. That principle carries through mentoring, instruction, outreach, and readiness-focused leadership.

View leadership and outreach →

Career Evolution

Phase 1

Operational Mission Systems

Precision logistics, readiness, and mission reliability in high-accountability operational environments.

Phase 2

Cyber Operations

Enterprise defense, threat hunting, malware exploitation support, and operational planning across mission networks.

Phase 3

Cyber Experimentation & Architecture

Designing environments and validation workflows that measure how defensive systems perform against realistic adversary behavior.