BLOG

Notes on security operations, cloud defense, compliance evidence, CTF learning, and GenAI-assisted workflows.

Recent Posts

How I Built a Compliance Evidence Pipeline

Normalizing AWS logs into auditor-ready evidence mapped to SOC 2 and ISO 27001 controls.

Designing a Student SOC Lab That Actually Teaches Detection

What worked while simulating attacks and tuning detections using Wazuh, Zeek, and Suricata.

Using LLMs for Faster Triage in Security Workflows

Where LLM-assisted enrichment helps, where it fails, and how to keep reports reproducible.