~/cyb3rn $ whoami

Abu Bakar Huzail

Digital Forensics & Incident Response

DFIR analyst specialising in incident response, digital forensics, malware analysis, and threat hunting. I investigate intrusions from initial alert triage through log analysis, artifact examination, containment, recovery, and post-incident review.

I share cheatsheets, hunting queries, and references on GitHub. Feel free to reach out — always happy to help or have a good tech chat.

🚨
Incident Response
Alert triage, detection and analysis, containment, eradication, recovery, and post-incident review.
🦠
Malware Analysis
Static and dynamic analysis of suspicious files — from initial triage to full behavioral profiling using CAPE.
🔭
Threat Hunting
Proactive hunting across endpoints and logs using KQL, Sigma rules, and MITRE ATT&CK.
📊
SIEM & Detection
Log analysis and detection engineering across Splunk, Microsoft Sentinel, and Defender XDR.
Platforms
Microsoft Sentinel Splunk SIEM XDR EDR
Detection & Hunting
KQL Sigma YARA MITRE ATT&CK
Forensics & Analysis
CAPE KAPE Wireshark
Scripting
Python PowerShell
🔬
CAPE Sandbox
cape.cyb3rn.com
Self-hosted dynamic malware analysis — detonation, behavioral reporting, and IOC extraction. Feel free to register and submit your samples for analysis.