$ Loading...
Tools, technologies, and methodologies I use to defend, detect, and respond to security threats.
Understanding cyber kill chains and threat frameworks to build effective defenses.
Monitoring and protecting endpoints using EDR tools and log analysis.
Securing cloud infrastructure, identifying misconfigurations, and implementing controls.
Analyzing network traffic to detect threats and investigate incidents.
Deploying and operating security information and event management systems.
Automating security tasks and building tools with code.
Understanding offensive techniques to build better defenses.
Gathering and analyzing threat data to proactively defend against attackers.