Self-motivated cybersecurity professional with hands-on experience in cloud security operations, threat intelligence analysis, vulnerability management, and incident response. CompTIA Security+ certified with a live cloud SOC project capturing over 27,000 real security events. Actively building toward a career in Cyber Threat Intelligence.
Azure / Cloud Security
- Live Cloud Honeynet & SOC in Azure β Deployed a live honeynet in Microsoft Azure using 3 VMs exposed to real internet traffic. Captured 27,083 security events and 211 incidents in 24 hours. Hardened the environment using NIST SP 800-53 controls β incidents dropped to zero after hardening. Tools: Microsoft Sentinel, KQL, Azure NSGs, Microsoft Defender for Cloud, NIST SP 800-61.
IT Help Desk & Support
- IT Help Desk Lab Scenarios β Documented realistic Tier 1 help desk scenarios with full ticket documentation including Active Directory account management, network troubleshooting, VPN support, printer issues, and phishing incident response. Format aligned with ServiceNow and Jira workflows.
Cyber Threat Intelligence
- CTI Analysis Portfolio β Coming soon. Threat actor profiles, DFIR incident analyses, IOC collections, and KQL detection rules built from real-world public threat intelligence reports.
| Certification | Issuer | Date |
|---|---|---|
| CompTIA Security+ (SY0-701) | CompTIA | Aug 2024 |
| Qualys Vulnerability Management Detection and Response | Qualys | Sep 2024 |
| Google Cybersecurity Professional Certificate | Google / Coursera | Nov 2023 |
| Cyber Security Analyst Program | Leveld Careers | Jan 2024 |
| MITRE ATT&CK CTI Training | MITRE | In Progress |
| Recorded Future Intelligence Analyst | Recorded Future | In Progress |
| Category | Skills |
|---|---|
| Security Tools | Microsoft Sentinel, Qualys VMDR, CrowdStrike, Wireshark, Microsoft Defender |
| Cloud & Infrastructure | Microsoft Azure, Virtual Machines, Network Security Groups, Azure Key Vault |
| Identity & Access | Active Directory, User Provisioning, Group Policy, MFA Administration |
| SIEM & Detection | KQL (Kusto Query Language), Log Analysis, Alert Triage, Incident Response |
| Frameworks | MITRE ATT&CK, NIST SP 800-53, NIST SP 800-61, HIPAA |
| Networking | TCP/IP, DNS, DHCP, VPN, LAN/WAN, Network Troubleshooting |
| Scripting | PowerShell (basic), Python (learning) |
| OS | Windows 10/11, Linux (Ubuntu), macOS |
- π Working on: IT Help Desk Lab Scenarios and CTI Analysis Portfolio
- π± Currently studying: MITRE ATT&CK CTI Training, Recorded Future Intelligence Analyst, Splunk Fundamentals
- π Reading: Intelligence-Driven Incident Response β Roberts & Brown
- π― Long term goal: Cyber Threat Intelligence Analyst
- π Pursuing: CompTIA CySA+ β GIAC GCTI β CISM
I analyze publicly available incident reports and threat intelligence to develop my CTI skills. Recent analyses:
- Apache ActiveMQ CVE-2023-46604 β LockBit Ransomware β Full attack timeline, 16 ATT&CK techniques mapped, IOC extraction, detection opportunities, and KQL queries. View Analysis