Showcase

Reports and builds that demonstrate how I work: evidence-first, practical, repeatable.

Reports

PDF writeups: investigation, monitoring design, and security engineering delivery.

Blue Team Malware Analysis Report

Threat investigation notes with evidence, behaviors, and IOC-style output.

MalwareIRAnalysis

Security Monitoring and Automation (Elastic SIEM)

Real-time monitoring design with detection flow and automation concepts.

ElasticSIEMAutomation

Cloud-Based SIEM with Elastic Stack (Azure)

Cloud deployment, log collection, dashboards, and validation via simulated activity.

AzureElasticDetection

ISO/IEC 27001-aligned policy set

Clean, readable policies that map to real organizational controls.

Information Security Policy

Top-level security principles and responsibilities.

Data Protection Policy

Handling of personal/sensitive data with a compliance mindset (GDPR-aware).

Acceptable Use and Password Policy

User behavior and credential hygiene with practical guardrails.

BYOD and Clean Desk

Practical policies for risk reduction in daily operations.

Extension demos

Short demos and links (kept lightweight so the page stays clean).

Windows Event Log Lookup

Event ID context at a click for faster investigations and fewer tabs.