EXPLORE MY WORK IN ACTION
-
Vulnerability Management
I simulate the implementation of a comprehensive vulnerability management program from inception to completion.

-
Threat Hunt Report
Unusual traffic and policy violations suggest TOR usage. Detect activity, analyze incidents, and report to management.

-
Incident Response: Brute Force Attack
A spike in failed logins suggests a potential brute force attack. Use Microsoft Sentinel and KQL to identify suspicious IPs and accounts for investigation.
