Skip to content
View develku's full-sized avatar
  • Brisbane, QLD, Australia

Block or report develku

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
develku/README.md

Hi, I'm Kud

Defensive security and IT support practitioner based in Australia.

  • full working rights, open to on-site, hybrid, and remote roles across Australia (including APS).

Focus areas: SOC operations, SIEM detection engineering, incident investigation, Active Directory security, and end-user support across Windows, Linux, and macOS.

Certifications

CDSA Google Cybersecurity AWS Developer AWS SA

  • HTB Certified Defensive Security Analyst (CDSA) — Dec 2025 · hands-on SIEM investigations, AD attack analysis, threat hunting, DFIR reporting
  • Google Cybersecurity Professional Certificate — Feb 2025
  • AWS Certified Developer — Associate — Dec 2024
  • AWS Certified Solutions Architect — Associate — Jun 2023

Featured Projects

A seven-repo portfolio covering Detection → Investigation → Response → Automation, with MITRE ATT&CK mapping and Essential Eight alignment throughout.

Detection

  • SIEM-Detection-Lab — Splunk SIEM deployment with Windows Event Log and Sysmon forwarders; Docker-based lab infrastructure
  • Detection-Engineering-Lab — 13 Sigma and Splunk SPL detection rules mapped to MITRE ATT&CK (credential access, persistence, defence evasion)
  • AD-Lab-Setup — Active Directory forest with automated PowerShell provisioning, Sysmon monitoring, and ATT&CK-mapped SOC detection scenarios

Investigation

  • Incident-Investigation-Portfolio — DFIR case studies reconstructed from public advisories: MOVEit Transfer (CVE-2023-34362 / CISA AA23-158A) and Scattered Spider help-desk vishing (CISA AA23-320A). 19 ATT&CK techniques across both reports with timelines, IOCs, and detection rules.

Response

  • Attack-Simulation-Lab — Atomic Red Team adversary emulation (credential dumping, lateral movement, persistence) correlated against SIEM detections to measure coverage

Automation & IT Service Management

  • claude-web-safety-hooks — Defence-in-depth hooks protecting AI coding assistants from prompt-injection; 580+ patterns across 16 threat categories
  • Help-Desk-Ticketing-Lab — osTicket ITSM on Ubuntu LAMP with SLA tiers, department-based routing, and role-based access control

Essential Eight Alignment

Labs cover control areas from the ACSC Essential Eight Maturity Model:

  • Restrict administrative privileges — AD-Lab-Setup (tiered admin, privilege audit)
  • Patch applications & operating systems — SIEM-Detection-Lab (patch status monitoring via Sysmon/Event Logs)
  • Application control — Attack-Simulation-Lab (validating control effectiveness through adversary emulation)
  • Multi-factor authentication — Incident-Investigation-Portfolio (Scattered Spider MFA-fatigue case study and detections)

Skills

Security Operations — Splunk, Elastic/ELK, Sysmon, Windows Event Log analysis, phishing investigation, incident response, MITRE ATT&CK, NIST, ISO 27001, CIS Controls

Systems & Infrastructure — Active Directory, Windows Server, Linux, macOS, DNS, DHCP, Group Policy, TCP/IP, VLANs, KAPE, Timeline Explorer

Scripting & Tools — Python, PowerShell, Bash, Git, Docker, Jira Service Management, osTicket, Microsoft 365 administration

Cloud — AWS IAM, EC2, S3, Lambda, CloudTrail, CloudWatch (monitoring cloud activity, least-privilege controls, serverless security)

Currently Working On

  • Studying for HTB CPTS (Certified Penetration Testing Specialist) — offensive perspective to sharpen defensive detection
  • Expanding the Incident Investigation Portfolio with additional CISA advisory case studies
  • Deeper Essential Eight mapping across the detection and response labs

Contact

Email LinkedIn

Brisbane, QLD · Open to SOC Analyst, Security Analyst, Detection Engineer, and IT Support / Service Desk roles.

Pinned Loading

  1. Attack-Simulation-Lab Attack-Simulation-Lab Public

    Adversary emulation scenarios using Atomic Red Team — credential dumping, lateral movement, persistence

    1

  2. AD-Lab-Setup AD-Lab-Setup Public

    Active Directory forest lab with automated provisioning, Sysmon monitoring, and ATT&CK-mapped SOC detection scenarios

    PowerShell

  3. Detection-Engineering-Lab Detection-Engineering-Lab Public

    Detection rules, Sigma rules, dashboards, and tuning for Splunk SIEM — 13 rules mapped to MITRE ATT&CK

  4. Help-Desk-Ticketing-Lab Help-Desk-Ticketing-Lab Public

    osTicket ITSM lab on Ubuntu LAMP — SLA tiers, department routing, RBAC, and documented ticket lifecycle scenarios

    Shell

  5. SIEM-Detection-Lab SIEM-Detection-Lab Public

    Splunk SIEM deployment and log collection lab — infrastructure, forwarder scripts, and Docker setup

    Shell

  6. Incident-Investigation-Portfolio Incident-Investigation-Portfolio Public

    Professional DFIR investigation reports analyzing real-world incidents from CISA advisories and CVE case studies — timelines, IOCs, ATT&CK mapping, and recommendations