About

Who I am

Hi, I’m Carl Underwood—the human behind Tanuki InfoSec.

I’m on a journey into cybersecurity, blending structured learning with hands-on labs and experiments. I’ve worked in demanding environments where clear communication, discipline, and problem-solving mattered every day. Those habits now shape the way I approach security: practical, calm under pressure, and focused on outcomes.

Along the way, I’ve built my own Elastic SIEM to monitor and analyze security events, hardened remote access with VPN and MFA, and designed GDPR-friendly data structures for small environments. These projects aren’t just technical checklists—they’re lessons learned, documented, and shared here.

Credentials and milestones

  • ISC2 Certified in Cybersecurity (CC)
  • Google Cybersecurity Certificate
  • ISO/IEC 27001 Associate • Opswat ICIP
  • Security+ (in progress)
  • Elastic SIEM lab, Nmap detection, alerting & dashboards
  • Leadership and teaching experience as an Adult Instructor in the Army Cadet Force

Outside security, I ran a flight simulation community called Nemesis Squadron. Aviation drills, structured training, and checklists have a lot in common with incident response—and I enjoy the crossover.

Tanuki InfoSec is my personal hub: part lab notebook, part blog, part portfolio. It’s where I share what I’m building, breaking, and learning in the hope it helps others walking a similar path.

Hands-On Strategies for Effective Cybersecurity Response

Discover the passionate experts driving our cybersecurity insights and projects.

Aiko Tanaka

Cybersecurity Analyst

Aiko leverages extensive experience to craft practical, actionable security solutions.

Liam O’Connor

Security Researcher

Liam thrives on innovative thinking and tackling complex cyber challenges.

Maya Patel

Penetration Tester

Maya focuses on uncovering vulnerabilities and strengthening defenses.

Ethan Brooks

Project Lead

Ethan drives our initiatives with clear vision and strategic expertise.

Insights and Learnings from Cybersecurity Projects

Discover practical guidance and detailed walkthroughs to help you dive into cybersecurity concepts and apply them effectively.

How a Cybersecurity Initiative Improved System Defenses

This case study details how implementing specific InfoSec tools enhanced protection, reduced vulnerabilities, and strengthened network security.

Enhancing Security Posture with Tailored Cyber Solutions

This case study demonstrates how deploying custom security measures minimized risks, improved response times, and supported compliance efforts.

Sustaining Cyber Resilience Through Innovative Practices

This case study reviews how a company addressed threats, refined protocols, and achieved superior security outcomes with expert tactics.