// Focus
03 / 03// 01●
Detect
SOC operations — detection engineering, triage, and incident response. Building the rules that catch what automation misses.
// 02●
Offense
Pentesting, red team, exploit development. Finding the door before the adversary does, then documenting how to lock it.
// 03●
Defense
Cyber defense leadership inside the CDC. Threat hunting, response coordination, and turning incidents into hardening.
// Recent
All entries →- 001
Living Off the Land: Spotting Malicious PowerShell and WMI in the Noise
A high-density technical guide for Tier 2 analysts on hunting LOLBins within Cortex XSIAM. We cover AMSI memory patching, WMI event consumers, and XQL-based detection.
- 002
FOSES: How to Combat Imposter Syndrome
A personal dive into "FOSES" (Fear of Sounding Extremely Stupid), navigating the Dunning-Kruger effect, and overcoming Imposter Syndrome in the IT industry.