Welcome to my digital headquarters. This profile documents my journey into the Art of Investigation, combining technical analysis with probabilistic thinking to solve security challenges.
My work is divided into two primary repositories. Click the badges below to navigate:
- Focus: Deep-dive investigations, fully documented projects, and end-to-end analysis.
- Key Phases:
Foundations|Threat Intelligence|AI & Automation
- Focus: Continuous learning, quick scripts, and "Art of Investigation" notes.
- Key Contents:
Linux Admin|SOC Playbooks|Lab Notes
I build and analyze using a "Code-First" approach to security.
| Category | Stack |
|---|---|
| SIEM & Analysis | |
| Operating Systems | |
| Automation & Data | |
| Infrastructure |
My approach to cybersecurity is built on:
- Probabilistic Thinking: Applying Bayes' theorem and logic to triage alerts and reduce false positives.
- The Art of Investigation: Moving beyond tools to understand the intent and narrative of an attack.
- Documentation: Believing that if it isn't documented, it didn't happen.
My projects are built and tested in a dedicated home lab environment:
- Hardware: Dell AIO Server
- Virtualization: VMware ESXi
- Visualization: JupyterLabs (integrated with GitHub for reporting)