Containment.Eradication.Recovery
Vulnerability Assessment, Threat Detection & Incident Response
Welcome to my corner of the internet where I journal cybersecurity
hands-on investigations and projects using Enterprise tools such as:
Azure VMs, SIEM, Microsoft Defender for Endpoint, Nessus, Wireshark
and Nmap to detect and analyze real-world threats.
Detect.Analyze.Protect
Vulnerability Assessment
Perform vulnerability scans using Nessus to identify critical security weaknesses. Analyze CVSS scores, prioritize risks, and recommend remediation strategies to reduce attack surface.
Threat Detection & Investigation
Identify and analyze suspicious activity using Microsoft Defender for Endpoint and SIEM tools. Experienced in investigating process behavior, network connections, and endpoint alerts to determine potential threats.
Network Analysis & Enumeration
Conduct network reconnaissance and traffic analysis using Nmap and Wireshark. Identify open ports, running services, and unusual traffic patterns that may indicate security risks.
Advanced Cyber Threat Detection & Analysis
I focus on real-world cybersecurity detection using KQL, SIEM platforms, and enterprise-grade tools. From identifying suspicious logins to analyzing attack patterns, I turn raw data into meaningful insights that help detect threats early and strengthen system security.This isn’t theory — it’s hands-on learning, real analysis, and practical cybersecurity in action.

TOOLS & TECHNOLOGIES
What You’ll Get From This Platform
Microsoft Sentinel (SIEM)
KQL (Kusto Query Language)
Log Analysis & Threat Hunting
Security Event Monitoring
Network & Authentication Logs
• Real-world cybersecurity detection techniques
• Practical KQL queries you can use immediately
• Clear breakdowns of complex security data
• Insights into how attackers operate
• Step-by-step learning from real scenarios
Why Cybersecurity Matters
Cyber threats are constantly evolving, and most attacks go unnoticed until damage is already done. Understanding your logs, detecting anomalies, and recognizing patterns early is what separates secure systems from compromised ones. The goal is simple: Detect early. Analyze deeply. Protect effectively.