π Cybersecurity enthusiast focused on Cloud Security, SIEM Monitoring, and Threat Detection.
- π« IT & Systems Specialist at Musaeus College
- βοΈ Working with Microsoft Azure Cloud Infrastructure
- π‘οΈ Passionate about Blue Team Security & Cyber Defense
- π Preparing for AZ-500 Microsoft Azure Security Engineer Certification
- π Building Real-World Cloud Security Labs
- π Focused on Identity Security, SIEM Monitoring, and Threat Detection
π Identity & Access Management
βοΈ Cloud Security Architecture
π SIEM Monitoring
π§ Threat Detection
βοΈ Incident Response
π Log Analysis
π‘οΈ Security Monitoring
π¨ Threat Hunting
Protecting web applications using Web Application Firewall and OWASP protection.
Securing Azure Virtual Machines using Microsoft Defender JIT Access.
Mitigating volumetric attacks using Azure DDoS Protection.
Detecting cyber threats using SIEM log monitoring and analytics.
Enterprise-style secure network architecture design.
Cyber attacks are constantly happening across the internet.
Security professionals use global threat intelligence platforms to monitor cyber threats.
Examples of global cyber threat monitoring tools:
β’ Kaspersky Cyber Threat Map
β’ Fortinet Cyber Threat Map
β’ Check Point Live Threat Map
- Azure WAF + Application Gateway Web Application Security Lab
- Enforcing Zero Trust with Azure Conditional Access & MFA
- Securing Azure Virtual Machines using Just-in-Time Access
- Microsoft Sentinel SOC Monitoring Lab
- Azure Security Engineering
- Cloud Threat Detection
- SIEM & SOC Monitoring
- Microsoft Sentinel Automation
- Security Architecture Design
β Always learning and building real-world cybersecurity labs.
