CFO transitioning into cybersecurity through intensive hands-on training. Building a foundation in threat detection, log analysis, and incident response. This space is for future DFIR case studies, security tool experiments, and contributions to open-source security projects.
Current Focus: Completing a 270-hour SOC Analyst track, mastering 35+ attack techniques (from web app exploits to Active Directory compromise) through hands-on labs with Wireshark, Splunk, ELK, and modern threat hunting methodologies. View my learning profile
OS & Environments: Windows | Linux (Kali, Ubuntu) | Virtualization
SIEM & Analytics: Splunk | Elastic Stack (ELK) | Microsoft Sentinel | Microsoft 365 Defender
Network Security Analysis: Wireshark | Nmap | Suricata
Digital Forensics & Incident Response (DFIR): Autopsy | FTK Imager | Volatility | Sysinternals Suite
Scripting & Automation: Python | PowerShell | Bash | JavaScript |
Frameworks & Standards: MITRE ATT&CK | Cyber Kill Chain | NIST CSF
Currently mastering hands-on SOC analysis through intensive training. This space is for future case studies and tools.
A practical, growing collection of security operations resources:
/network-attacks-detection– 19 techniques: scanning, web attacks (SQLi, XSS, CSRF), wireless attacks, and malicious traffic analysis./endpoint-attacks-detection– 11 techniques: Windows/Linux process anomalies, vulnerability exploitation, SAM/LSASS attacks, and persistence mechanisms./active-directory-attacks-detection– 10 techniques: AD reconnaissance, Kerberos attacks, Pass-the-Hash/Ticket, DCSync, and certificate service abuse.
--

