Cyber Threat Intelligence
CurrentMonitored and analyzed security events using Wazuh, Grafana, Splunk and KQL for proactive threat detection.Automated deployment of security tools with Docker and gained practical knowledge in Linux administration for cybersecurity operations.Performed network vulnerability scans with Nmap and OpenVAS, delivering actionable insights for risk.