Cybersecurity Professional | Detection Engineering | Blue Team
🎓 M.S. Cybersecurity — Syracuse University
🔐 Currently focused on Detection Engineering, SOC Operations & Threat Analysis
- Writing and validating detection rules (Sigma/YARA) against MITRE ATT&CK
- Malware analysis: static + dynamic analysis, IOC extraction, behavioral analysis
- Building a home lab: Splunk + Sysmon + Windows AD for detection validation
- Automating SOC workflows with Python
Sigma & YARA detection rules mapped to MITRE ATT&CK techniques. Validated using Atomic Red Team adversary emulation.
Hands-on malware analysis reports with static/dynamic analysis, IOC extraction, and detection rule creation.
Python-based log parser with anomaly detection using Isolation Forest for Windows Event Logs, Apache, and auth.log.
Detection & SIEM: Splunk, Sigma, YARA, Sysmon, Windows Event Logs
Analysis: FLARE-VM, REMnux, Wireshark, PEstudio, Process Monitor, FakeNet-NG
Languages: Python, PowerShell, Bash, SQL
Cloud: AWS (EC2, S3, IAM, CloudTrail, GuardDuty)
Frameworks: MITRE ATT&CK, NIST CSF, Kill Chain
Open to Detection Engineer, SOC Analyst, and Blue Team Security roles.