Multi-Stage Cyberattack Forensic Analysis using Splunk SIEM
Simulated an enterprise breach scenario and reconstructed the full kill chain using Splunk. Authored advanced SPL queries and dashboards to surface IOCs and the attacker's timeline.
- •Simulated enterprise breach with realistic adversary behavior
- •Developed SPL queries and visualization dashboards
- •Identified IOCs and reconstructed attack timeline end-to-end
