Section

12 pages

Projects

Tools, automations, and integrations built across threat intelligence, security operations, and detection engineering.

Featured image of post SOAR Playbook: Insider Threat Detection & Response

SOAR Playbook: Insider Threat Detection & Response

A SOAR playbook for detecting and responding to insider threats — combining DLP alerts, UBA anomalies, access pattern analysis, and a structured investigation workflow.

Featured image of post Automated Threat Intelligence Report Generator

Automated Threat Intelligence Report Generator

A pipeline that pulls IOCs, TTPs, and threat actor profiles from MISP, VirusTotal, and open sources, then automatically generates structured HTML and PDF threat intelligence reports.

Featured image of post SIEM Alert Tuning Automation

SIEM Alert Tuning Automation

Automated pipeline for analysing SIEM alert fidelity, identifying false positive patterns, generating suppression recommendations, and tracking detection health over time.

Featured image of post Threat Hunting: Network-Based Techniques

Threat Hunting: Network-Based Techniques

Network traffic analysis techniques for hunting C2 beaconing, DNS tunnelling, data exfiltration, and anomalous lateral movement using SIEM queries and flow data.

Featured image of post Threat Hunting with MITRE ATT&CK

Threat Hunting with MITRE ATT&CK

A structured methodology for hypothesis-driven threat hunting using the MITRE ATT&CK framework — from selecting techniques to building hunt packages, writing SIEM queries, and documenting findings.

Featured image of post SOAR Playbook: Vulnerability Management Automation

SOAR Playbook: Vulnerability Management Automation

Automated CVE ingestion, asset correlation, CVSS-based prioritisation, and patch ticketing — turning raw scanner output into an actionable, risk-ordered remediation queue.

Featured image of post SOAR Playbook: Ransomware Response

SOAR Playbook: Ransomware Response

A structured SOAR playbook for ransomware incidents — from initial detection through isolation, scope assessment, recovery coordination, and post-incident hardening.

Featured image of post YARA Rules for Malware Detection

YARA Rules for Malware Detection

Custom YARA rules for detecting malware families and attacker tooling observed in regional threat campaigns, with authoring methodology, testing procedures, and SIEM integration.

Featured image of post Dark Web Monitoring

Dark Web Monitoring

Automated monitoring of paste sites, dark web forums, and leak channels for compromised credentials, data exposure, and threat actor mentions of target organisations.