Soroush Asadi's IT and Cybersecurity Project Portfolio 🔐
I'm really into cybersecurity and enjoy taking on complex challenges through hands-on projects. Whether it's vulnerability management or threat detection, I like digging into the details and staying sharp in this constantly evolving field. Feel free to check out my projects—each one’s been a great way for me to improve security operations and processes in a practical way!
- STIG Implementations
- Vulnerability Management Program Implementation
- Manual Vulnerability Creation & Remediation
- Programmatic Vulnerability Remediation
- Threat Hunting Scenario: Tor Browser Usage
- Threat Hunting Scenario: Brute Force Attacks
- Threat Hunting Scenario: Sudden Network Slowdowns
- Threat Hunting Scenario: Data Exfiltration from PIP'd Employee
- Incident Response: Brute Force Attempt Detection
- Incident Response: PowerShell Suspicious Web Request
- Incident Response: Potential Impossible Travel
- Incident Handling & Analysis
- Utilizing NIST CyberSecurity Framework (CSF) 2.0
- Controls and Compliance Checklist
- GRC Mapping – Incident Response & Compliance
- osTicket (Help Desk Ticketing System)
- Microsoft Azure
- CompTIA Security+