Skip to content
View SheDefends's full-sized avatar
  • Germany

Block or report SheDefends

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SheDefends/README.md

πŸ›‘ SheDefends

Defending the digital world β€” one alert at a time.


πŸ‘©β€πŸ’» About Me

Hello! I’m a Cybersecurity Analyst based in Germany with a passion for blue team operations, SOC workflows, and cloud threat detection.

I currently support internal security at AVASK, where I monitor alerts, manage identity access controls, and contribute to proactive defenses across Azure and Microsoft 365 environments. My work is backed by certifications such as:

  • πŸ›‘ CompTIA Security+ (SY0-701 β€” Valid till 2025)
  • ☁️ Google Cybersecurity Certificate (2024)

I created this GitHub portfolio to showcase practical projects in SIEM, incident response, detection engineering, and cloud security.


🧠 Technical Skills

Category Tools & Technologies
SIEM Splunk, Elastic SIEM, Wazuh
Threat Detection MITRE ATT&CK, Sigma rules, THOR, Velociraptor
Endpoint/Network Defender for Endpoint, Suricata, Zeek
Scripting & Analysis Python, PowerShell, Wireshark
Cloud Security Google Cloud IAM, Azure AD, Conditional Access, VPC
Platforms TryHackMe, Kali Linux, pfSense, VirtualBox

πŸš€ Featured Projects

Here are some of the most impactful hands-on projects I’ve built and documented:

πŸ§ͺ Docker-based lab simulating cloud attacks & responses using Splunk, Elastic, OSQuery, Caldera, and more. Perfect for hands-on threat emulation & SIEM/SOAR workflows.

πŸ”Ž Detects Windows login abuse and PowerShell exploitation using Splunk queries and MITRE ATT&CK mapping. Includes sample logs and detection rules.

πŸ“š Personal walkthroughs from TryHackMe's SOC Level 1 path β€” includes phishing detection, malware triage, and alert classification techniques.


πŸ“Š GitHub Stats

GitHub Stats
Top Languages


🌍 Contact

  • πŸ–₯ GitHub: github.com/SheDefends
  • πŸ“ Germany (Remote-friendly)
  • πŸ“¬ Available via private message for collaborations, blue team roles, or mentorships

⚠️ This GitHub is part of my public cybersecurity brand. For privacy, my legal name is not displayed β€” only used in official application documents.


Always learning. Always defending. Always one step ahead.

Pinned Loading

  1. splunk-brute-force-detection splunk-brute-force-detection Public

    Brute-force login detection using Splunk and Windows log

    3 5

  2. Cloud-Threat-Detection-and-Response-Lab Cloud-Threat-Detection-and-Response-Lab Public

    A modular, Docker-based lab environment for hands-on threat detection, incident response, and SIEM/SOAR integration using tools like Splunk, Elastic SIEM, Cribl, OSQuery, and Caldera.

    Shell 2

  3. Soc-Analyst-Lab-Journey Soc-Analyst-Lab-Journey Public

    My hands-on SOC Analyst journey using TryHackMe & Security+ labs

    1