Monitoring Brute Force Attacks
ProjectBuilt an Azure honeypot to capture brute-force login attempts. Investigated attacker activity with KQL and visualized source geolocations on a custom map.
I'm a cybersecurity student at Western Governors University pursuing a B.S. in Cybersecurity and Information Assurance. I build hands-on labs and technical projects that show my commitment to learning, problem-solving, and designing secure systems — investigating threats, hardening infrastructure, and turning raw telemetry into actionable defense.
A collection of hands-on labs exploring threat hunting, analysis, vulnerability remediation, and compliance. Real infrastructure, real telemetry, real defense.
Built an Azure honeypot to capture brute-force login attempts. Investigated attacker activity with KQL and visualized source geolocations on a custom map.
Capture-the-flag threat hunt simulating a corporate compromise. Traced adversary activity via MDE telemetry and KQL to build a timeline across the attack lifecycle.
Investigated suspected TOR browser use to bypass company controls. Traced file activity, process execution, and network connections to known relay nodes.
A Python tool that scans .eml files for phishing indicators. Checks sender, body, links, and attachments — assigns a score, verdict, and optional VirusTotal checks.
Scanned an Azure environment with Nessus to uncover vulnerabilities across VMs and services. Prioritized high-severity risks and validated fixes through follow-up scans.
Python workflow connecting the OpenAI API to an Azure environment for log aggregation. AI-driven triage accelerates detection and reduces manual SOC workload.
Completed competency-based coursework covering network security, cryptography, digital forensics, incident response, vulnerability assessment, cloud security, Python scripting, SQL optimization, Linux administration, SIEM tools, and NIST/ISO security frameworks.