Projects
Cybersecurity Projects
Welcome to my curated repository of cybersecurity projects, designed to showcase practical skills and insights valuable to hiring managers. Explore diverse initiatives covering network analysis, encryption techniques, and threat detection, empowering you to strengthen your team's digital defense capabilities.
Masterminds
Three machines in the Finance department at Pfeffer PLC were compromised. We suspect the initial source of the compromise happened through a phishing attempt and by an infected USB drive. The Incident Response team managed to pull the network traffic logs from the endpoints. Use Brim to investigate the network traffic for any indicators of an attack and determine who stands behind the attacks.
Investigating with Splunk
SOC Analyst Johnny has observed some anomalous behaviors in the logs of a few windows machines. It looks like the adversary has access to some of these machines and successfully created some backdoor. His manager has asked him to pull those logs from suspected hosts and ingest them into Splunk for quick investigation. Our task as SOC Analyst is to examine the logs and identify the anomalies.