Skip to content
View amangmab's full-sized avatar

Block or report amangmab

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
amangmab/README.md

Aman Abraha — Information Security Analyst (Portfolio)

I build practical security projects that demonstrate security monitoring, alert triage, incident response, vulnerability management, and secure system hardening. My portfolio focuses on hands-on Security Operations Center (SOC) workflows with clear documentation and repeatable lab setups.

What I’m working on

  • Security monitoring + incident response with Wazuh (open source Extended Detection and Response and Security Information and Event Management)
  • Active Directory (centralized identity and authentication) attack and defense hardening
  • Vulnerability management (scan → prioritize → remediate → re-scan)
  • Cloud Security Information and Event Management detections using Microsoft Sentinel (Azure)

Featured Projects

Skills Demonstrated

  • Security monitoring, alert triage, and incident reporting
  • Windows and Linux logging (Windows Security logs, Sysmon System Monitor)
  • Vulnerability scanning and remediation validation
  • Active Directory fundamentals and identity hardening
  • Cloud logging and Security Information and Event Management detections
  • Documentation: diagrams, evidence screenshots, executive summaries

Contact

Popular repositories Loading

  1. amangmab amangmab Public

    Cybersecurity portfolio: projects, labs, and documentation focused on security operations and information security.

  2. vulnerability-management-program vulnerability-management-program Public

    End-to-end vulnerability management program: policy, authenticated scanning, triage, Change Advisory Board (CAB) change control, remediation, and metrics.

    PowerShell