Cybersecurity Analyst focused on SOC Operations, Threat Intelligence, and Log Analysis. Skilled in Python, Splunk, and Linux. This site hosts interactive guides to standardize and accelerate incident triage and response procedures.
First-level verification, initial containment, and triage protocols.
Deep analysis, forensic review, and systemic eradication procedures.
"Boss of the SOC" v1 Scenario. Interactive 7-phase incident simulation.