Skip to content
View ajcyberdefense's full-sized avatar

Block or report ajcyberdefense

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ajcyberdefense/README.md

Hi, I'm Anthony 👋

Security Engineer · IAM Specialist · Threat Hunter

I'm a cybersecurity professional with hands-on experience in identity and access management (IAM), vulnerability management, email security, and endpoint protection. I build and document real-world security projects to sharpen my skills and share knowledge with the community.


🛠️ Skills & Technologies

Python PowerShell Bash Linux AWS Git

Security Domains: Identity & Access Management Vulnerability Management Threat Hunting Threat Intelligence Honeypot Deployment Email Security Endpoint Protection SIEM


🔐 Security Projects

Deployed and documented a fully operational Cowrie SSH/Telnet honeypot on a hardened AWS EC2 instance. Captures real-world brute-force attacks, attacker session recordings, and malware download attempts. Includes a real-time Flask web dashboard, CLI log analyzer, and automated setup scripts.

AWS Python Flask Cowrie UFW Fail2ban Systemd


End-to-end implementation of a vulnerability management program — from asset discovery and scanning through prioritization, remediation tracking, and reporting. Documents the full lifecycle using industry frameworks.

Vulnerability Management Risk Prioritization Remediation


PowerShell and Bash scripts for automating common vulnerability remediations. Reduces manual effort and improves consistency across endpoints.

PowerShell Bash Automation Remediation


Threat hunting scenario investigating unauthorized Tor browser usage on a corporate network. Documents the hypothesis, detection methodology, log analysis, and findings.

Threat Hunting SIEM Log Analysis Network Security


A collection of threat intelligence reports analyzing real-world threat actors, malware campaigns, and emerging attack techniques. Each report follows a structured intelligence format.

Threat Intelligence OSINT Malware Analysis


📊 GitHub Stats

Anthony's GitHub Stats Top Languages


📬 Connect With Me

LinkedIn Email


Open to security engineering roles, consulting, and collaboration. Feel free to reach out!

Pinned Loading

  1. cowrie-honeypot cowrie-honeypot Public

    Cowrie SSH honeypot deployed on AWS with traffic monitoring

    Python

  2. threat-hunting-tor-browser threat-hunting-tor-browser Public

    Threat Hunt Report: Unauthorized TOR Usage

  3. threat-intel-reports-michigan-dmv-phishing threat-intel-reports-michigan-dmv-phishing Public

    Threat Investigation Report: Phishing Domain Impersonating Michigan DMV

  4. Vulnerability-management-program Vulnerability-management-program Public

    Vulnerability Management Program Implementation