EXPLORE MY WORK IN ACTION

  • Vulnerability Management

    I simulate the implementation of a comprehensive vulnerability management program from inception to completion.

    Vulnerability Management
  • Threat Hunt Report

    Unusual traffic and policy violations suggest TOR usage. Detect activity, analyze incidents, and report to management.

    Threat Hunt Report
  • Incident Response: Brute Force Attack

    A spike in failed logins suggests a potential brute force attack. Use Microsoft Sentinel and KQL to identify suspicious IPs and accounts for investigation.

    Incident Response: Brute Force Attack

LET’S WORK TOGETHER