Skip to content
View 0xAtef's full-sized avatar
πŸ₯·
I may be slow to respond.
πŸ₯·
I may be slow to respond.

Block or report 0xAtef

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xAtef/README.md

πŸš€ Cyber Defense Lead & Consultant


πŸ‘¨β€πŸ’» About Me

Strategic SOC/Cyber Defense Lead with extensive experience in leading and architecting proactive security operations, bridging the gap between Cyber Threat Intelligence (CTI), threat detection engineering, and incident response. Expert in establishing and managing MSOC/Resident SOC teams, building end-to-end detection pipelines mapped to MITRE ATT&CK, and driving an intelligence-led defense strategy. Proven track record in designing, integrating, and optimizing core security solutions (SIEM, SOAR, EDR, TIPs, DRP), developing custom automation and tooling (Python, N8N, "ThreatOps"), and applying DFIR/Forensics for deep-dive investigations. A certified professional dedicated to leveraging strategic leadership and deep technical expertise to build a unified, adaptive, and highly effective cyber defense capability.

"You need to understand what you are protecting"


πŸ› οΈ Technology Stack

πŸ›‘οΈ SIEM & Log Management

QRadar Splunk Elastic FortiSIEM Wazuh

πŸ€– SOAR & Automation

TheHive n8n Shuffle IBM Resilient FortiSOAR Python

πŸ” EDR, XDR & NDR

Trellix Fidelis Group-IB IBM QNI Kaspersky

🧠 Threat Intelligence (TIP, Dark Web, ASM, DRP)

Group-IB Dark Atlas CTM360 SOC Radar Google Threat Intelligence ThreatQ MISP Criminal IP Cynerv Tenable

βš”οΈ C2 & Emulation

Covenant Havoc Caldera

πŸ’» Programming & Scripting

Python Bash PowerShell

πŸ”¬ Forensics Tools

Volatility Eric Zimmerman Tools Velociraptor SIFT

🌐 Network Security

Wireshark

πŸ› οΈ Other Tools

Git Docker


🎯 Skills Summary

  • Cyber Defense Center - Strategic planning and operations
  • Cyber Defense Intelligence - Intelligence-driven defense strategies
  • SOC - Security Operations Center management and operations
  • DFIR - Digital Forensics and Incident Response
  • Cyber Threat Hunting (CTH) - Proactive threat detection and hunting
  • Cyber Threat Intelligence (CTI) - Threat intelligence collection, analysis, and operationalization
  • Standard Operating Procedure (SOP) - Process development and documentation
  • Playbook - Incident response and security playbook development
  • Compromise Assessment - Advanced threat detection and eradication
  • SOC Assessment - Security operations maturity evaluation
  • Threat-Informed Defense - Intelligence-led security strategy

πŸ“š Currently Learning / Recent Focus

  • Advanced Compromise Assessment - Deep-dive threat detection and eradication techniques
  • Threat Hunting - Advanced hunting methodologies and techniques
  • Forensics - Digital forensics and investigation capabilities

πŸ’Ό Professional Journey

2025 - Present | Cyber Defense Lead

2024 - 2025 | Sr. Cyber Defense DFIR Analyst

2022 - 2024 | Sr. SOC/Cyber Defense Analyst

2021 - 2022 | Security Operations Specialist


πŸ† Key Accomplishments

  • πŸ€– Automated CTI Pipeline: Built comprehensive automated CTI pipeline using MISP, N8n, and Python.
  • πŸ—ΊοΈ MISP Galaxy: Designed and published a custom MISP Galaxy mapping ransomware actors to ATT&CK.
  • πŸ”„ n8n Workflows: Built end-to-end enrichment pipelines for MISP events.
  • πŸ“Š MISP Analytics: Created interactive Jupyter Notebook dashboards for threat visualization.
  • βš”οΈ Attack Simulation: Utilized CALDERA for adversary emulation and defense testing.

🧾 Certificates

  • πŸŽ“ eCTHPv2 – eLearn Security Certified Threat Hunting Professional
  • πŸŽ“ Threat Intelligence Analyst – Group-IB
  • πŸŽ“ Cyber Investigator – Group-IB
  • πŸŽ“ Belkasoft Windows Forensics
  • πŸŽ“ Certified Cybersecurity Educator Professional (CCEP)
  • πŸŽ“ Certified Threat Hunting and Incident Response I (CTHIRI)
  • πŸŽ“ MITRE ATT&CK Fundamentals Certification

πŸš€ Featured Projects


github contribution grid snake animation

Blog posts

Popular repositories Loading

  1. sigma sigma Public

    Forked from SigmaHQ/sigma

    Main Rule Repository

    Python 1

  2. 0xAtef 0xAtef Public

  3. atomic-red-team atomic-red-team Public

    Forked from redcanaryco/atomic-red-team

    Small and highly portable detection tests based on MITRE's ATT&CK.

    PowerShell

  4. sigma-specification sigma-specification Public

    Forked from SigmaHQ/sigma-specification

    Sigma rule specification

  5. C2-Server C2-Server Public

    Forked from 0xRick/c2

    A basic c2 / agent.

    Python

  6. Blue-Team-Notes Blue-Team-Notes Public

    Forked from Purp1eW0lf/Blue-Team-Notes

    You didn't think I'd go and leave the blue team out, right?