Security
Operations
Hands-on experiments and documented learning experiences from my cybersecurity journey

Project 5.1: LOG(N) Pacific Internship: Threat Hunting Scenario 1
A comprehensive threat hunting exercise investigating devices accidentally exposed to the internet, using Microsoft Defender for Endpoint and Microsoft 365 Security suite to analyze brute-force attempts and validate unauthorized access.
Cybersecurity
Blog
Insights, research, and lessons from my cybersecurity journey

Vulnerability Management Explained: What Every Cybersecurity Professional Needs to Master
A comprehensive guide to vulnerability management, covering core concepts, lifecycle processes, and practical implementation strategies for cybersecurity professionals.

A Practical Guide to Cybersecurity Frameworks and Policies
In the constantly evolving landscape of cybersecurity, frameworks and policies have become the backbone of how organizations protect their systems, safeguard their data, and respond to emerging threats. This comprehensive guide explores the core frameworks, compliance requirements, and practical implementation strategies that form the foundation of effective cybersecurity programs.