A SOAR playbook for detecting and responding to insider threats — combining DLP alerts, UBA anomalies, access pattern analysis, and a structured investigation workflow.
A pipeline that pulls IOCs, TTPs, and threat actor profiles from MISP, VirusTotal, and open sources, then automatically generates structured HTML and PDF threat intelligence reports.
Automated pipeline for analysing SIEM alert fidelity, identifying false positive patterns, generating suppression recommendations, and tracking detection health over time.
Network traffic analysis techniques for hunting C2 beaconing, DNS tunnelling, data exfiltration, and anomalous lateral movement using SIEM queries and flow data.
A structured methodology for hypothesis-driven threat hunting using the MITRE ATT&CK framework — from selecting techniques to building hunt packages, writing SIEM queries, and documenting findings.
A structured SOAR playbook for ransomware incidents — from initial detection through isolation, scope assessment, recovery coordination, and post-incident hardening.
Custom YARA rules for detecting malware families and attacker tooling observed in regional threat campaigns, with authoring methodology, testing procedures, and SIEM integration.
Production-ready SOAR playbooks for phishing response and compromised account containment — with full step-by-step logic, decision trees, and integration pseudocode.
Automated monitoring of paste sites, dark web forums, and leak channels for compromised credentials, data exposure, and threat actor mentions of target organisations.