Cloud

Phishing analysis and detection featured image

Phishing analysis and detection

Designed and implemented an automated phishing analysis and response workflow using SOAR principles to identify, analyse, and triage phishing indicators efficiently.

Azure Cloud Honeypot & Threat Analysis featured image

Azure Cloud Honeypot & Threat Analysis

Deployed a vulnerable Azure Virtual Machine to simulate a honeypot, aggregating and analyzing live brute-force attacks from the open internet.