01Authoring vendor-agnostic Sigma rules compiled to Splunk SPL, Sentinel KQL, and Elastic EQL
02Developing application-layer anomaly detections for Supabase Auth and Stripe fraud patterns
030 GitHub stars
04Executing structured threat hunts and converting findings into automated behavioral detections
05Mapping detection coverage to MITRE ATT&CK techniques to identify and prioritize critical gaps
06Implementing Detection-as-Code (DaC) workflows with CI/CD validation and automated deployment