dandye
GitHub profile for dandye1 skill
Are you dandye? Claim your skills.
dandye / deep-dive-ioc
Enables comprehensive analysis of critical Indicators of Compromise (IOCs) for escalated investigations, enhancing threat detection and attribution.
dandye / hunt-apt
Proactively hunts for TTPs and IOCs associated with specific APT groups using threat intelligence and SIEM data.
dandye / hunt-ioc
Proactively hunts for specific Indicators of Compromise (IOCs) across environments using threat intelligence for enhanced security monitoring.
dandye / hunt-threat
Enables advanced threat hunting through hypothesis-driven analysis, leveraging threat intelligence and iterative search methodologies.
dandye / respond-compromised-account
Facilitates structured response to compromised user accounts, ensuring investigation, containment, and recovery from security incidents.
dandye / respond-malware
Facilitates malware incident response using the PICERL methodology, ensuring effective triage, containment, eradication, and recovery.
dandye / respond-phishing
Facilitates structured response to phishing incidents using the PICERL methodology, ensuring effective identification and containment.
dandye / respond-ransomware
Facilitates structured response to ransomware incidents using the PICERL methodology, ensuring effective identification and recovery.
dandye / triage-alert
Assesses security alerts to determine threats, enriches context, and decides on escalation or closure based on gathered evidence.
dandye / triage-malware
Analyzes suspected malware file hashes, providing insights and recommendations for containment and investigation.
dandye / full-triage-alert
Orchestrates a complete Tier 1 alert triage process, enabling efficient alert management and escalation for security analysts.
dandye / full-investigation
Facilitates comprehensive Tier 2 investigations of escalated security cases, orchestrating deep analysis and reporting.
dandye / enrich-ioc
Enriches Indicators of Compromise (IOCs) with threat intelligence, providing reputation, context, and match status for enhanced security analysis.
dandye / hunt-credential-access
Proactively hunts for credential access techniques using MITRE ATT&CK framework to identify potential credential harvesting activities.
dandye / hunt-lateral-movement
Proactively hunts for lateral movement in networks using PsExec and WMI, identifying suspicious activities and potential threats.
dandye / triage-suspicious-login
Assists in triaging suspicious login alerts by analyzing user history and login patterns to determine escalation needs.
dandye / close-case-artifact
Facilitates the closure of cases or alerts with necessary documentation and reasons, ensuring proper incident management.
dandye / correlate-ioc
Correlates Indicators of Compromise with existing SIEM alerts and case management entries to enhance threat investigation and response.
dandye / check-duplicates
Identifies duplicate or similar cases to streamline analysis and avoid redundant investigations in case management.
dandye / analyze-content-gaps
Identifies content gaps and opportunities by analyzing existing documentation against user needs and competitive benchmarks.