SOC ANALYST PORTFOLIO

Incident Response Reports

Real-World Security Investigation Case Studies

I've conducted multiple security incident investigations through real-world security incidents and threat investigations. These comprehensive reports demonstrate my ability to conduct digital forensics, analyze threat actor behavior, identify IOCs, and document security incidents following industry best practices.

AZUKI-001 CRITICAL

Targeted Intrusion - Azuki Import/Export

Investigation of a targeted intrusion involving RDP compromise, credential dumping with Mimikatz, lateral movement, data exfiltration, and anti-forensic log clearing. Comprehensive analysis of attacker TTPs and defense evasion techniques.

Techniques: Initial Access, Defense Evasion, Credential Dumping Tools: Mimikatz, PowerShell, Certutil
AZUKI-ADMINPC CRITICAL

Admin PC Compromise - Azuki Import/Export

Deep-dive investigation into an administrator workstation compromise. Analysis covers privilege escalation, persistence mechanisms, command and control communications, and the full attack lifecycle on a high-value target.

Techniques: Privilege Escalation, Persistence, C2 Focus: High-Value Target Analysis
AZUKI-Q4-02 CRITICAL

Q4 2025 Security Incident - Azuki Import/Export

Investigation of a sophisticated attack campaign during Q4 2025. Detailed timeline reconstruction, KQL hunting queries, and comprehensive MITRE ATT&CK framework mapping of observed adversary behaviors across the kill chain.

Period: Q4 2025 Framework: MITRE ATT&CK Mapping
BROKER-001 HIGH

Financial Services Security Breach

Incident response investigation for a brokerage firm security breach. Analysis includes network intrusion detection, financial data access patterns, threat actor infrastructure analysis, and recommendations for security hardening in financial environments.

Sector: Financial Services Focus: Data Protection, Network Analysis