
EXPLORE MY WORK IN ACTION
-
Vulnerability Management
I simulate the implementation of a comprehensive vulnerability management program from inception to completion.
-
Threat Hunt Report
Unusual traffic and policy violations suggest TOR usage. Detect activity, analyze incidents, and report to management.
-
Incident Response: Brute Force Attack
A spike in failed logins suggests a potential brute force attack. Use Microsoft Sentinel and KQL to identify suspicious IPs and accounts for investigation.