1 follower
Resourceful Cybersecurity Engineer with three (3) years of experience in Security Events Monitoring, DFIR, Threat Hunting and Malware Analysis.
In this exercise, I investigated failed authentication attempts with Splunk to detect potential threat actors attempting to gain access to the...
A proactive approach to threat detection · Understanding Threat Hunting Organisations use Security Information and Event Management (SIEM) software which...
Malware Excercise 2015-08-07 – Someone was Fooled by a Malicious Email. · In this exercise, I investigate an incident wherein a user got compromised...
Scenario 1: Worm and Distributed Denial of Service (DDoS) Agent Infestation Study the following scenario and discuss and determine the incident...