1. Who is in the house?Unexpected users, service accounts used interactively, or odd login times = early compromise indicators. Look...
JoinedJanuary 11, 2026
Articles1
Defensive Security Lead focused on detection engineering, identity security, and cloud defense across enterprise environments.
Building resilient detection strategies, strengthening identity controls, and driving incident response readiness in modern cloud-first architectures.
CISSP | SecurityX | Microsoft Certified Cybersecurity Architect Expert | SC300 | CEH

