Security Data Works

About

Jeremy Wiley.

Security data architecture and detection engineering. Co-authored OCSF 2.0's Network Protocol Category. Contributes to ITU-T Study Group 17. Runs a 70-hypothesis research portfolio with documented contradictions where new evidence overturned prior positions.

Previously at Corelight (PS Engineer — shipped Data Health Check and Data Health Enablement), Southern Company (Senior Security Architect, NERC-CIP OT estate), and Accenture (Splunk migrations in regulated environments).

U.S. Marine Corps veteran. Atlanta Metro.

Wrote Modular Open Architecture (MOAr) for Cybersecurity Data — manuscript complete, in production, Amazon KDP.

Commercial terms

How this practice makes money.

  • No reseller margins. The practice does not earn commission on any product recommended.
  • No vendor-paid placements. The matrix does not include sponsored or promoted candidates.
  • Open methodology. Benchmark methodology, hardware spec, query suite, and result are public on the lab. The reference implementation is shared under NDA with engagement prospects and qualifying reviewers — comparison sets that include commercial software whose licensing terms restrict third-party publication of comparative results stay gated rather than worked around.
  • Annual external review by a named practitioner. One outside practitioner with relevant standing audits the published benchmark results each year under NDA. Their signoff is published on the lab page.