I’m Kelly Brazil and I’ve been in the cybersecurity industry for a couple decades now. I taught myself how to program when I was in third grade and I love to dabble in lots of techie topics including network security, cloud computing, automation, microservice architectures and security, software defined networking and SD-WAN, linux, APIs, guitar, and Oxford commas.
Welcome to my blog – I’ll get the urge to write on one of these topics from time to time and I encourage open dialogue.

Where to find me:
- LinkedIn: https://www.linkedin.com/in/kellybrazil/
- Twitter: @kellyjonbrazil
- Mastodon: @kellyjonbrazil@sfba.social
- Facebook: https://www.facebook.com/kellyjbrazil
- GitHub: https://github.com/kellyjonbrazil
My projects:
jc
JSON Convert – converts the output of scores of popular commands and filetypes to JSON for easier parsingjello
JSON and JSON Lines processor (likejq
but uses full python syntax)- Jello Explorer (
jellex
) Interactive TUI JSON and JSON Lines processor using python syntax built onjello
jtbl
prints JSON and JSON lines as plaintext tables in the terminalmicrosim
Simulated Microservice, Traffic, and Attack Generator (used in my Microservice Security Design Patterns for Kubernetes series)- github
- github pages
- docker hub (microsimserver, microsimclient)
- Open Cybersecurity Alliance OASIS Member
Media, Mentions, and Events:
- Interview with Gh03T Security Webcast on SOAR and Automation
- Interview with Console about OSS and
jc
- JC featured on the PythonBytes podcast (15:40)
- JC mentioned on the LinuxUnplugged podcast
- MEF19 SD-WAN Panels
- Introducing ThreatX NGWAF to Japan Market Article
- Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAF SANS Webcast
- Empowering a Small Security Team – ICS Security Presentation at EnergySec
- Cloud-powered Network Detection and Response from Endpoint to Network Webinar
- Forbes: 60 Cybersecurity Predictions for 2018 Article (also on Dataconnectors)
- Securing Enterprises in the Age of Cloud Computing Article
- Selling a Security Solution to your CEO in Three Minutes ISSA SFBay Chapter
- Nowhere to Hide: How Automating Threat Detection Gives You the Higher Ground at the PANW Spark User Summit in Denver, CO
- 7 Security Requirements to Accelerate Cloud Adoption Webinar
- Threat Hunting Workshop at Dropbox with RiskIQ
- Detecting Threats in the Cloud Webinar
- Elastica Appoints Former Palo Alto Networks, Qualys and Bromium Executives to Lead Sales and Channels Article
- Palo Alto Networks and VMware unite in cyber crime fight Article
- Assume users will do the wrong thing when it comes to security, expert advises Article
- Application Usage and Threat Report on BFM Radio Interview
- Improve security by monitoring traffic Article
- Unknown Traffic Bigger Security Threat than Social Media Article
- Firewalls are Changing ISSA Hawaii Chapter Presentation
Some of my prior blog posts can be found here: