Threat Hunter • Detection Engineer

I hunt threats. I build detections. From the trenches — not the sidelines.

I find what automated tools miss, turn threat intelligence into high-fidelity detections, and build security operations from scratch. Currently engineering detection coverage across 1,300+ Sigma rules and custom detections at Secnap Network Security.

0
Sigma Detections
0
Custom Detections
0
EDR Platforms
0
Certifications

Breaking Adversary Tradecraft,
One Detection at a Time.

🎯

Threat Hunting

Proactive hypothesis-driven hunts across endpoint, cloud, and identity environments. I dig through raw telemetry to find what automated tools miss — from VPN compromises to FIDO downgrade attacks.

Detection Engineering

Designing and tuning high-fidelity detection rules mapped to MITRE ATT&CK. From Sigma rules to custom LimaCharlie detections, I build coverage that catches real threats without drowning the SOC in noise.

🔧

Building From Scratch

SOC platforms, criticality scoring, workflow systems, threat timelines — I've orchestrated the build of entire security operations infrastructure in a lean startup environment where nothing existed before.

Real Hunts. Real Detections. Real Impact.

Threat Hunt → Detection

ClickFix Attack Detection

Detected a ClickFix attack through callstack analysis — explorer.exe with shell32.dll launching untrusted processes. Caught it before NetSupport RAT could establish persistence. Built a detection rule to catch this pattern across all customer environments.

Red Canary → 2-Month Gap

Undetected VPN Compromise

Discovered a threat actor with a 2-month undetected VPN compromise attempting Active Directory brute force. Developed a recurring hunt to address the detection gap and prevent similar compromises going forward.

Identity Hunting

FIDO Downgrade & Infostealers

Identified FIDO downgrade attacks in Azure Entra ID, malicious LNK files pointing to C2 servers, and infostealers like Chihuahua Stealer during proactive hunts across customer environments.

Kernel-Level Detection

Ransomware via File I/O Patterns

Created ransomware detection rules using File I/O patterns in Windows kernel events through Fibratus and ETW providers. Built kernel-level visibility where traditional EDR had blind spots.

Tools & Platforms I Work With

LimaCharlie CrowdStrike SentinelOne Microsoft Defender Carbon Black Palo Alto Cortex Wazuh SIEM Velociraptor Fibratus (ETW) Sigma Rules MITRE ATT&CK Azure Entra ID Active Directory Jupyter / Pandas PowerShell Linux Admin Fortinet Ubiquiti

Let's Connect

Whether you want to talk threat hunting, detection engineering, or just nerd out about adversary tradecraft — I'm always down.

Get In Touch