Threat Hunt Walkthrough: Detecting TOR Browser Usage
A practical demonstration of structured threat hunting - from hypothesis to detection rules.
Cybersecurity Analyst with hands-on experience in vulnerability management and SOC operations. Conduct asset discovery scans, prioritize findings based on asset criticality and CVSS severity, and collaborate with infrastructure teams to drive remediation efforts. Validate fixes through verification testing and rescans to ensure effective risk reduction.
Exposure to SOC alert triage, investigating alerts, building context to determine true positives, and reducing alert noise to support efficient operations. Former System Administrator at a healthcare startup managing critical EHR infrastructure in a production environment.
Layer Seven Security
Layer Seven Security
Proline Consulting
Medical Clinic / Healthcare Startup
Hands-on security implementations and technical demonstrations
A practical demonstration of structured threat hunting - from hypothesis to detection rules.
Incident Response Case Study – Brute Force Attempt (Simulation)
When I first started in cybersecurity, I could run Nmap scans and play with Metasploit, but real enterprise environments were a different beast. I quickly learned that understanding Windows domains...
One of the most impactful projects I've worked on for my growth in cybersecurity has been designing and building my own lab environment. A space where I could practice both...
One of the quirks of running a home lab is that you often uncover problems you'd rarely notice on a simple home network. Recently, I ran into one of those...
CompTIA
Azure Security
Security Operations
Amazon Web Services
In Progress
Western Governors University
In Progress
Open to opportunities in cybersecurity and security operations