Cybersecurity Analyst | Threat Hunter | Incident Responder
I am dedicated to protecting digital assets and managing risks in an ever-evolving threat landscape.
With a focus on analysis, detection, and response, I strive to strengthen organizational defenses and ensure the integrity, confidentiality, and availability of critical information systems.
Snort
Wireshark
EDR
M365
Azure AD
KQL
Bash
Python
TCP/IP
CTI
Vuln Mgmt
MITRE ATT&CK
NIST
ISO 27001
Burp Suite
A practical penetration testing walkthrough focused on enumeration, exploitation, and privilege escalation.
An analysis of phishing techniques and countermeasures, including email security and user awareness training.
An incident response framework for token theft, including detection, investigation, containment, and recovery procedures.
A growing collection of KQL queries for threat detection, investigation, and monitoring in cloud and hybrid environments.
A comprehensive guide to penetration testing AWS environments, focusing on common misconfigurations.
Investigated a compromised Windows endpoint by analyzing registry persistence, logs, and process activity to uncover a malicious PowerShell payload.
I am a Cybersecurity Analyst with 3+ years of hands-on experience in endpoint security, threat detection, and Digital Forensics & Incident Response (DFIR). In my SOC role, I actively monitor, investigate, and respond to security incidents across endpoint, identity, and cloud environments.
Alongside my professional work, I have a strong passion for adversary simulation and practical security research. I regularly conduct in-depth Windows and Linux forensic investigations, simulate real-world attack techniques.
With solid skills in Microsoft Defender XDR, KQL, scripting (Python, Bash), and a commitment to continuous learning, I strive to build resilient security solutions that protect organizations from evolving threats.
Have a question? I would love to hear from you.