Hi, I’m Jean.
I am currently studying Infrastructure and Cybersecurity, with a practical focus on:
- Blue Team operations
- SOC workflows and security monitoring
- Active Directory security
- DFIR fundamentals
- Detection engineering
- System and network administration
I use personal projects to strengthen my technical skills, document my progress, and build a more operational understanding of cybersecurity environments.
- Building a personal SOC / Blue Team lab
- Developing ADFT — an Active Directory forensic analysis project
- Practicing log analysis, detection logic and investigation workflows
- Improving my skills on Windows event analysis, SIEM usage, MITRE ATT&CK and threat hunting
- Connecting tools such as Wazuh, Suricata, Zeek, IRIS, OpenCTI, n8n and Python automation
ADFT is a Python-based project focused on helping defenders analyze suspicious activity in Active Directory environments.
Current work includes:
- ingestion of EVTX, JSON and SIEM-like logs
- event parsing and normalization
- detection-oriented analysis
- MITRE ATT&CK mapping
- timeline reconstruction
- suspicious AD activity investigation support
- defender-oriented outputs for analysis and hardening
Goal: build a practical and understandable investigation toolkit for Blue Team and Active Directory security use cases.
🔗 Repository: ADFT
A personal lab environment designed to explore realistic defensive workflows.
Main objectives:
- simulate security-relevant activity
- collect and analyze logs
- test detections
- validate investigation workflows
- connect several tools in a more operational way
Technologies used:
- Windows / Active Directory
- Linux
- Docker
- Wazuh
- Suricata
- Zeek
- OpenCTI
- n8n
- Python
- PowerShell
- Active Directory security analysis
- Detection engineering fundamentals
- SOC workflows
- DFIR practice
- Threat hunting methodology
- Security monitoring
- Defensive tooling and automation
- continue improving ADFT into a solid public project
- strengthen my SOC, Blue Team and Active Directory security skills
- publish a clean and credible cybersecurity portfolio
- build practical projects aligned with real defensive needs
- secure a strong opportunity in SOC, Blue Team or Cyber Defense
Build • Detect • Investigate • Improve