Skip to content
View Knighthawk76's full-sized avatar

Block or report Knighthawk76

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Knighthawk76/README.md

Hi there, I'm Jadica Murray! πŸ‘‹

πŸ›‘οΈ Cybersecurity Analyst | Cloud Security Enthusiast | Azure Specialist | AI Practitioner

I am a passionate cybersecurity professional focused on Cloud Security,Network Defense, GRC and Responsible AI. I specialize in building and securing cloud infrastructure, and utilizing SIEM tools to detect and mitigate threats.


πŸš€ Featured Project

A comprehensive cloud security lab simulating a real-world attack environment.

  • The Goal: Created a "honeynet" in Azure to attract cyberattacks and analyze them using Microsoft Sentinel.
  • The Tech: Azure, Log Analytics, Microsoft Sentinel (SIEM), KQL, PowerShell, NIST Framework.
  • The Result: Analyzed live RDP/SSH brute force attacks from around the world. After applying security hardening controls, reduced malicious flows by >99%.

View the Full Project & Attack Maps Β»


πŸ› οΈ Technical Skills & Tools

Category Tools & Technologies
Cloud Platforms Azure
SIEM & Analytics Microsoft Sentinel, Azure Log Analytics, Kusto Query Language (KQL)
Operating Systems Windows Linux
Networking VNet Configuration, NSGs, Firewalls, TCP/IP, DNS
Scripting PowerShell Python
Security Frameworks NIST 800-53, NIST Cybersecurity Framework (CSF)

πŸ“Š GitHub Stats

stats graph languages graph

πŸ“« Let's Connect

Pinned Loading

  1. Azure-Honeynet Azure-Honeynet Public

    A comprehensive cybersecurity project building a SOC and Honeynet in Microsoft Azure to capture, analyze, and mitigate live attack traffic using Microsoft Sentinel.

  2. Vulnerability-Scanning Vulnerability-Scanning Public

    Openvas Scan done with and without credentials.

  3. Windows-Server-With-Active-Directory- Windows-Server-With-Active-Directory- Public