Defending the digital world β one alert at a time.
Hello! Iβm a Cybersecurity Analyst based in Germany with a passion for blue team operations, SOC workflows, and cloud threat detection.
I currently support internal security at AVASK, where I monitor alerts, manage identity access controls, and contribute to proactive defenses across Azure and Microsoft 365 environments. My work is backed by certifications such as:
- π‘ CompTIA Security+ (SY0-701 β Valid till 2025)
- βοΈ Google Cybersecurity Certificate (2024)
I created this GitHub portfolio to showcase practical projects in SIEM, incident response, detection engineering, and cloud security.
| Category | Tools & Technologies |
|---|---|
| SIEM | Splunk, Elastic SIEM, Wazuh |
| Threat Detection | MITRE ATT&CK, Sigma rules, THOR, Velociraptor |
| Endpoint/Network | Defender for Endpoint, Suricata, Zeek |
| Scripting & Analysis | Python, PowerShell, Wireshark |
| Cloud Security | Google Cloud IAM, Azure AD, Conditional Access, VPC |
| Platforms | TryHackMe, Kali Linux, pfSense, VirtualBox |
Here are some of the most impactful hands-on projects Iβve built and documented:
π§ͺ Docker-based lab simulating cloud attacks & responses using Splunk, Elastic, OSQuery, Caldera, and more. Perfect for hands-on threat emulation & SIEM/SOAR workflows.
π Detects Windows login abuse and PowerShell exploitation using Splunk queries and MITRE ATT&CK mapping. Includes sample logs and detection rules.
π Personal walkthroughs from TryHackMe's SOC Level 1 path β includes phishing detection, malware triage, and alert classification techniques.
- π₯ GitHub: github.com/SheDefends
- π Germany (Remote-friendly)
- π¬ Available via private message for collaborations, blue team roles, or mentorships
β οΈ This GitHub is part of my public cybersecurity brand. For privacy, my legal name is not displayed β only used in official application documents.
Always learning. Always defending. Always one step ahead.

