Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View threat-punter's full-sized avatar

Organizations

@googlers

Block or report threat-punter

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
threat-punter/README.md

Hello 👋

Your data is one of your most valuable assets — the better you protect it from attack, the better your reputation will be with discerning customers. I'm a Staff Security Engineer, specialized in Detection Engineering and Security Operations — I defend organizations against attacks and protect their data and customers from damage and loss.

You can find some of my research, open-source tools, conference presentations, and technical publications here.

I've publised extensive research and examples for implementing Detection-as-Code. I'm the creator of Dorothy — a tool to help security teams test their monitoring and detection capabilities for their Okta environment. I presented Dorothy at Black Hat USA.

I'm on LinkedIn and Medium

Pinned Loading

  1. security-publications security-publications Public

    Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security community.

    27 2

  2. elastic/dorothy elastic/dorothy Public

    Python 187 12

  3. detection-as-code-example detection-as-code-example Public

    A POC to implement Detection-as-Code with Terraform and Sumo Logic.

    Python 29 11

  4. google-secops google-secops Public

    Example code for working with Google Security Operations (SecOps)

    Python

  5. chronicle/detection-rules chronicle/detection-rules Public

    Collection of example YARA-L rules for use within Google Security Operations

    Python 448 116