Featured Work

Securing Systems

Endpoint Detection and Response

Using Microsoft Defender for Endpoint.

PowerShell Suspicious Web Request

Where logs are coming from, what to look for, and what to do next.

Threat Hunting Unauthorized TOR Usage

How to proactively investigate threats on the network.

Virtual Machine Brute Force Detection

Using Microsoft Azure for VMs and Sentinel for SIEM.

Potential Impossible Travel

Exploring logs in Microsoft Defender, setting alerts in SIEM.

Vulnerability Management Program

How to implement and maintain secure systems and software.

Let’s work together

Want to know more or see a demo of my work? I’d love to have a face-to-face with you and share any of my experiences using cybersecurity tools to accomplish business goals.

ask@derrickhorton.com