Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

security-analyst

Here are 28 public repositories matching this topic...

Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam prep and skill-building in blue team operations.

  • UpdatedNov 10, 2025

Overnight Hercules for Network Security: Become a Security Analyst book

  • UpdatedSep 22, 2025

Portfolio of hands-on cybersecurity projects, including risk assessment reports, security policy implementation, SIEM analysis (Splunk/Chronicle), and network security concepts

  • UpdatedOct 13, 2025

A comprehensive cybersecurity interview preparation guide with questions, resources, and tips across various security domains including DFIR, penetration testing, security operations, and cloud security. Designed for both entry-level and experienced professionals.Mock Interview

  • UpdatedMay 7, 2025

Windows Agent written in .NET for detecting and pushing new security events to a remote server.

  • UpdatedApr 12, 2025
  • C#

The File miner application will allow you to select a Drive or Folder and search all files ( or selected file extensions ) for certain keywords and display it in the results window. A handy tool if you have to search every file on a computer or file share for key documents or files that contain any of the key word(s) in the search group. This ap…

  • UpdatedSep 1, 2021
  • Visual Basic .NET
Raqeeb27

My GitHub profile's home, a personal showcase of my work as a cybersecurity enthusiast and aspiring software engineer.

  • UpdatedAug 31, 2025

Full-scope digital forensics investigation and incident response following a cyberattack at Premium House Lights, a fictional small business. The case includes discovery, log analysis, lateral movement tracing, and business-focused incident remediation recommendations.

  • UpdatedDec 6, 2025

Comprehensive documentation of cyber security best practices and recommendations for enterprise environments. This project provides guidance on implementing effective security controls and establishing a strong security posture across organizations.

  • UpdatedDec 6, 2025

Comprehensive risk management plan aligned with ISO 27001 information security management standards. This project demonstrates a systematic approach to identifying, analyzing, and mitigating information security risks within an organization.

  • UpdatedDec 6, 2025

Detailed vulnerability assessment and risk analysis with CVSS scoring, severity ratings, prioritized remediation roadmap, and evidence logs.

  • UpdatedDec 6, 2025

SIEM Threat Detection Lab is a hands-on, open-source security operations platform designed for learning, testing, and demonstrating modern SOC capabilities.

  • UpdatedDec 14, 2025
  • Python

Network administration and digital forensics project featuring network scanning, traffic analysis, and executive reporting. This project demonstrates network reconnaissance techniques, vulnerability identification, and comprehensive security documentation for stakeholders.

  • UpdatedDec 6, 2025

Complete security policy framework organized by Traffic Light Protocol (TLP) classifications with implementation procedures and incident response playbooks.

  • UpdatedDec 6, 2025

Lets Defend | Nivel: Beginner

  • UpdatedNov 2, 2024

Automated log monitoring and analysis workflow combining Bash scripting and Python. This project demonstrates systematic approaches to log collection, parsing, analysis, and alerting for security monitoring and compliance purposes.

  • UpdatedDec 6, 2025
  • Python

Comprehensive investigation and analysis of a simulated data breach at LifeLabs. This project demonstrates forensic investigation techniques, breach impact assessment, and recommendations for breach prevention and response.

  • UpdatedDec 6, 2025

Comprehensive digital forensics and incident response investigation into the theft of a proprietary Szechuan sauce recipe and intellectual property exfiltration. This merged project combines two distinct forensics case studies demonstrating real-world investigative methodologies suitable for corporate incident response.

  • UpdatedDec 6, 2025

Improve this page

Add a description, image, and links to thesecurity-analyst topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with thesecurity-analyst topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2025 Movatter.jp