A cyber threat intelligence platform for threat and vulnerability analysis, investigations, testing, and mitigation
-
Wrote continous monitoring and ingestion system to import, analyze, and score log data without duplicating anything and preserving context and source maps.
-
Designed advanced penetration tests in order to formulate IoC Patterns based on signatures seen in logs
- Developed interface with a streamlined workflow to control ingestion, triage alerts and fine tune inference
engine analysis
- Configured Docker containers and managed all DevOps to GCP
- Building ML model to detect anomalies in web server logs and emails