Cloud-Focused Cybersecurity Practitioner
Passionate about securing cloud environments, building automated defenses, and learning through hands-on labs.
- Aspiring Blue Team cybersecurity analyst focused on Microsoft cloud security tools
- Completed multiple Azure-based lab projects with Microsoft Sentinel, Defender for Endpoint, and Logic Apps
- Currently preparing for the SC-200: Microsoft Security Operations Analyst certification
- Committed to continuous learning, threat detection, and real-world SOC scenarios
- SIEM Tools: Microsoft Sentinel (Analytics Rules, Workbooks, Hunting, Automation)
- EDR Tools: Microsoft Defender for Endpoint
- Cloud Security: Azure Security Center, Azure Monitor, Logic Apps
- Threat Detection: KQL, IOC investigation, automated response rules
- Networking & Tools: Wireshark, Nmap, Nessus, Incident Response
- Scripting: PowerShell (basic), KQL
- Operating Systems: Windows, Linux
Cloud-native SIEM lab built in Azure to simulate detection, response, and visualization using:
- Analytics Rules
- Custom KQL queries
- Workbooks & Dashboards
- Automation Rules
π‘οΈ Defender-Automated-Incident-Lab
End-to-end lab integrating Microsoft Defender for Endpoint with Sentinel and Logic Apps to:
- Simulate EICAR malware attacks
- Trigger alerts and incidents
- Automatically run playbooks and email alerts
- [ISC2] Certified in Cybersecurity (CC)
- Fortinet NSE 1 & 2
- Cisco Certified: Networking, Routing, Wireless Essentials
- Practicing advanced KQL queries and threat hunting techniques
- Building new use cases with Microsoft Defender and Microsoft Purview
- Studying for SC-200 certification (via Microsoft Learn & labs)
βThe best way to learn security is to build it, break it, then defend it.β


