Writing
Analyst Notes
Mental models, checklists, and method — the processes behind the cases.
Quantifying analytical fatigue post-telemetry expansion. A workflow for validating signal integrity during data onboarding.
Beyond simple MFA verification. Auditing Token Theft (AitM) and Session Authority through orthogonal telemetry pivots.
Differentiating between volatile entity-level suppression and durable attribute-level logic. Managing detection decay.
Ensuring atomic coverage by hunting TTPs across disjoint telemetry layers (Process, Network, Registry).
Reconstructing the Received header chain and validating the sender authentication triplet for phishing triage.
Detecting and remediating malicious application consent grants that persist through password resets and MFA enforcement.
Tracing parent-child execution chains and identifying Living-off-the-Land binary abuse through lineage analysis.
Detecting inbox rule creation as a persistence and concealment mechanism in Business Email Compromise campaigns.
Correlating cross-host execution signatures across SMB file writes, WMI process creation, and RDP session initiation.
Identifying the 4-phase pre-encryption operational pattern: discovery, credential harvesting, staging, and inhibit recovery.
Auditing table-level ingestion volumes, identifying verbose data sources, and implementing transformation-based cost controls.
Systematic audit of CA policy coverage to identify authentication bypass paths and trust boundary weaknesses.