Threat Hunt Walkthrough: Detecting TOR Browser Usage
A practical demonstration of structured threat hunting - from hypothesis to detection rules.
Cybersecurity professional specializing in Security Operations Center (SOC) analysis, vulnerability management, and incident response. Currently serving as System Administrator at a healthcare startup, managing critical EHR infrastructure while pursuing advanced security certifications.
Experienced in SIEM operations (Microsoft Sentinel), threat hunting, and security automation. Strong background in cloud security (Azure, AWS), compliance frameworks (HIPAA), and hands-on technical troubleshooting in production environments.
Medical Clinic / Healthcare Startup
Layer Seven Security
Proline Training and Consulting
Hands-on security implementations and technical demonstrations
A practical demonstration of structured threat hunting - from hypothesis to detection rules.
Incident Response Case Study – Brute Force Attempt (Simulation)
One of the quirks of running a home lab is that you often uncover problems you'd rarely notice on a simple home network. Recently, I ran into one of those...
When I first started in cybersecurity, I could run Nmap scans and play with Metasploit, but real enterprise environments were a different beast. I quickly learned that understanding Windows domains...
One of the most impactful projects I've worked on for my growth in cybersecurity has been designing and building my own lab environment. A space where I could practice both...
CompTIA
Azure Security Technologies
Security Operations Analyst
Amazon Web Services
ISC² - In Progress
[Your University]
In Progress
Open to opportunities in cybersecurity and security operations