I'm passionate about cybersecurity and love tackling complex challenges through hands-on projects. From vulnerability management to threat detection, these projects allow me to dive deep into the ever-evolving landscape of cybersecurity. Please feel free to check them out and see the work I’ve put into enhancing security operations and processes!
🎯 Full SIEM
- Implementing a SOC & Honeynet with Azure; Attacking and remediating it (Live Traffic)
- Why KQL Maps Are Essential for CEOs and Non-Tech People
- Setting up Splunk SIEM; Attacking and remediating it (Live Traffic)
- Vulnerability Management Program Implementation
- Operation Jackal Spear: A Threat Hunting Scenario
- 15+ Programmatic Vulnerability Remediations (PowerShell and BASH))
- 20+ STIG Implementations Remediations (PowerShell)
- Vulnerability Management in Azure Sandbox
- Threat Hunting Scenario (Tor Browser Usage)
- Incident Response: Threat Hunting (Operation Jackal Spear)
- Incident Response: PwnCrypt Outbreak: A Zero-Day Ransomware Event
- Incident Response: Detecting Remote Code Execution (RCE)
- Creating Alert Rules for Brute Force Attempts
- Phishing Email Response Workflow
- Incident Response: Detecting-Suspicious-PowerShell-Web-Activity
- Incident Response: Alert-Rule-Potential-Impossible-Travel
- Threat Hunting Incident: Data Exfiltration by PIP'd Employee
- Threat Hunting Incident: Public Facing IP Detection
- Threat Hunting Incident: Sudden Network Slowdowns
- Incident Response: Phishing via Fake Software Update
- NIST Framework: Compliance Implementation Guide
Network
Endpoint
SIEM
Security Testing
Vulnerability Management
Cloud
- CISSP: Expected October 2025
- CompTIA CySA+: Expected September 2025