Security Specialist
SOC Analyst
Threat Hunter

Hi, I'm
Samson Otori

|

Welcome to my portfolio site, where I document my journey through cybersecurity experiments, projects, and learning experiences.

Featured Posts

Security
Operations

Hands-on experiments and documented learning experiences from my cybersecurity journey

Project 5.1: LOG(N) Pacific Internship: Threat Hunting Scenario 1
Blue Team

Project 5.1: LOG(N) Pacific Internship: Threat Hunting Scenario 1

A comprehensive threat hunting exercise investigating devices accidentally exposed to the internet, using Microsoft Defender for Endpoint and Microsoft 365 Security suite to analyze brute-force attempts and validate unauthorized access.

Blue TeamThreat HuntingMicrosoft Security+4
Project 5: LOG(N) Pacific Internship: Cyber Range Journey
Blue Team

Project 5: LOG(N) Pacific Internship: Cyber Range Journey

An immersive journey into enterprise-grade cybersecurity tools through the Cyber Range internship program, focusing on Microsoft Azure, Sentinel, Defender for Endpoint, and Tenable vulnerability management.

Blue TeamSOCInternship+4
Project 4.7: TheHive & Cortex Deployment in My Cybersecurity Home Lab
Blue Team

Project 4.7: TheHive & Cortex Deployment in My Cybersecurity Home Lab

Deploying TheHive incident response platform and Cortex automated analysis engine in my segmented cybersecurity home lab for enhanced SOC workflow capabilities.

TheHiveCortexIncident Response+9
Featured Posts

Cybersecurity
Blog

Insights, research, and lessons from my cybersecurity journey

Breaking Out: Understanding CVE-2025-9074 in Docker Desktop
Insights

Breaking Out: Understanding CVE-2025-9074 in Docker Desktop

A deep dive into CVE-2025-9074, a critical vulnerability in Docker Desktop that allowed complete host compromise from any container with just two HTTP requests.

CVEDockerContainer Security+4
Vulnerability Management Explained: What Every Cybersecurity Professional Needs to Master
Foundations

Vulnerability Management Explained: What Every Cybersecurity Professional Needs to Master

A comprehensive guide to vulnerability management, covering core concepts, lifecycle processes, and practical implementation strategies for cybersecurity professionals.

Vulnerability ManagementCybersecurityRisk Management+2
A Practical Guide to Cybersecurity Frameworks and Policies
Foundations

A Practical Guide to Cybersecurity Frameworks and Policies

In the constantly evolving landscape of cybersecurity, frameworks and policies have become the backbone of how organizations protect their systems, safeguard their data, and respond to emerging threats. This comprehensive guide explores the core frameworks, compliance requirements, and practical implementation strategies that form the foundation of effective cybersecurity programs.

Cybersecurity FrameworksNIST CSFISO 27001+5