Sanitized project evidence | Cybersecurity | Threat hunting
Advanced Threat Hunting
Turning attacker behaviour into hunt questions, telemetry requirements and practical investigation logic.
Public portfolio version: I removed names, class details and private document information. This page shows the project approach and evidence in a safe format recruiters can review.
Project focus
Threat hunting as proactive analysis
The project explained how threat hunting differs from SOC alert triage, incident response and detection engineering. The emphasis was on asking better questions before an alert exists, then proving or disproving those questions with telemetry.
My contribution
Led the core analysis
I led the work, completed the main research and produced the written deliverable. The strongest part of the work was translating security theory into testable investigation logic that a technical team could use.
Method
From behaviour to hunt logic
1
Hypothesis
Define suspicious behaviour in a way that can be tested.
2
Telemetry
Map the logs and signals needed to confirm or reject the hypothesis.
3
Hunt question
Turn the behaviour into practical questions analysts can investigate.
4
Action
Document the result, tune detections and recommend the response path.
Key Concepts Covered
- Hypothesis-driven hunting and testable assumptions
- IOC-based detection compared with TTP-focused hunting
- Windows Event Logs, Sysmon, DNS logs, proxy logs, EDR process trees and cloud audit logs
- MITRE ATT&CK T1078: Valid Accounts
- Cyber Kill Chain critique and behaviour-based hunting
T1078 Hunt Questions
- Are legitimate accounts logging in outside normal working patterns?
- Are accounts performing actions beyond their usual role?
- Are there simultaneous logins from locations that should be impossible?
- Do privilege changes appear shortly after unusual authentication events?
Example Query Logic
- Filter successful authentication events outside normal hours.
- Group account activity within short time windows to detect impossible travel or unusual user-agent changes.
- Correlate authentication events with sensitive resource access or privilege changes.
- Reduce false positives with user baselines, VPN allowlists and multi-signal correlation.
Recruiter Takeaway
This project shows cybersecurity reasoning, analytical writing, MITRE ATT&CK literacy and the ability to translate attacker behaviour into structured investigation work. It supports junior cybersecurity analyst, SOC analyst, QA analyst and systems analyst roles where security awareness matters.