security-analyst
Here are 28 public repositories matching this topic...
Language:All
Sort:Most stars
Cloud Security Operations Orchestrator
- Updated
Apr 17, 2024 - Python
Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam prep and skill-building in blue team operations.
- Updated
Nov 10, 2025
Overnight Hercules for Network Security: Become a Security Analyst book
- Updated
Sep 22, 2025
Portfolio of hands-on cybersecurity projects, including risk assessment reports, security policy implementation, SIEM analysis (Splunk/Chronicle), and network security concepts
- Updated
Oct 13, 2025
A comprehensive cybersecurity interview preparation guide with questions, resources, and tips across various security domains including DFIR, penetration testing, security operations, and cloud security. Designed for both entry-level and experienced professionals.Mock Interview
- Updated
May 7, 2025
portfolio
- Updated
Apr 6, 2025 - JavaScript
Windows Agent written in .NET for detecting and pushing new security events to a remote server.
- Updated
Apr 12, 2025 - C#
The File miner application will allow you to select a Drive or Folder and search all files ( or selected file extensions ) for certain keywords and display it in the results window. A handy tool if you have to search every file on a computer or file share for key documents or files that contain any of the key word(s) in the search group. This ap…
- Updated
Sep 1, 2021 - Visual Basic .NET
My GitHub profile's home, a personal showcase of my work as a cybersecurity enthusiast and aspiring software engineer.
- Updated
Aug 31, 2025
Full-scope digital forensics investigation and incident response following a cyberattack at Premium House Lights, a fictional small business. The case includes discovery, log analysis, lateral movement tracing, and business-focused incident remediation recommendations.
- Updated
Dec 6, 2025
Comprehensive documentation of cyber security best practices and recommendations for enterprise environments. This project provides guidance on implementing effective security controls and establishing a strong security posture across organizations.
- Updated
Dec 6, 2025
Comprehensive risk management plan aligned with ISO 27001 information security management standards. This project demonstrates a systematic approach to identifying, analyzing, and mitigating information security risks within an organization.
- Updated
Dec 6, 2025
Detailed vulnerability assessment and risk analysis with CVSS scoring, severity ratings, prioritized remediation roadmap, and evidence logs.
- Updated
Dec 6, 2025
SIEM Threat Detection Lab is a hands-on, open-source security operations platform designed for learning, testing, and demonstrating modern SOC capabilities.
- Updated
Dec 14, 2025 - Python
Network administration and digital forensics project featuring network scanning, traffic analysis, and executive reporting. This project demonstrates network reconnaissance techniques, vulnerability identification, and comprehensive security documentation for stakeholders.
- Updated
Dec 6, 2025
Complete security policy framework organized by Traffic Light Protocol (TLP) classifications with implementation procedures and incident response playbooks.
- Updated
Dec 6, 2025
Lets Defend | Nivel: Beginner
- Updated
Nov 2, 2024
Automated log monitoring and analysis workflow combining Bash scripting and Python. This project demonstrates systematic approaches to log collection, parsing, analysis, and alerting for security monitoring and compliance purposes.
- Updated
Dec 6, 2025 - Python
Comprehensive investigation and analysis of a simulated data breach at LifeLabs. This project demonstrates forensic investigation techniques, breach impact assessment, and recommendations for breach prevention and response.
- Updated
Dec 6, 2025
Comprehensive digital forensics and incident response investigation into the theft of a proprietary Szechuan sauce recipe and intellectual property exfiltration. This merged project combines two distinct forensics case studies demonstrating real-world investigative methodologies suitable for corporate incident response.
- Updated
Dec 6, 2025
Improve this page
Add a description, image, and links to thesecurity-analyst topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with thesecurity-analyst topic, visit your repo's landing page and select "manage topics."