Skip to content
View jwnfld3's full-sized avatar

Block or report jwnfld3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jwnfld3/README.md

Blue Team Security Analyst Portfolio

Cybersecurity professional specializing in identity threat detection, authentication monitoring, and security incident investigation within Microsoft cloud environments.

My projects demonstrate how security analysts detect suspicious authentication activity, investigate identity related alerts, analyze security logs, and implement remediation procedures in enterprise Microsoft environments.

All investigations are performed in a controlled lab environment designed to simulate enterprise SOC workflows.


SOC Investigation Workflow

The following workflow demonstrates how identity security events are collected, detected, investigated, and remediated within a Microsoft cloud security environment.

Stage Security Process Platform
1 User Authentication Activity Microsoft Entra ID
2 Authentication Logs Collected Microsoft Entra ID Sign-in Logs
3 Threat Detection Rules Microsoft Sentinel (KQL)
4 Security Investigation SOC Analyst Investigation Cases
5 Incident Response Response Playbooks

Core Technologies

Microsoft Sentinel Microsoft Entra ID Microsoft 365 Active Directory Windows Server Microsoft Intune Kusto Query Language MITRE ATT&CK


Featured Security Investigations

Blue Team Security Investigation Project

Enterprise Identity Incident Investigation

This repository demonstrates how identity based security incidents can be detected, investigated, and remediated using Microsoft Sentinel, Microsoft Entra ID authentication logs, and the MITRE ATT&CK framework.

The project simulates the workflow used by Security Operations Center analysts when investigating suspicious authentication activity in enterprise Microsoft environments. It includes detection rules, authentication log analysis, investigation case files, MITRE ATT&CK technique mapping, and incident response playbooks.

Investigation scenarios were developed in a controlled lab environment designed to simulate enterprise authentication monitoring and identity security incidents.

Detection Coverage

The investigation environment includes detection rules designed to identify identity based attacks within Microsoft Entra ID and Microsoft Sentinel logs.

Attack Technique Detection Rule
Password Spray Password Spray Detection
Impossible Travel Impossible Travel Detection
MFA Fatigue MFA Fatigue Detection
Phishing Login Phishing Login Detection
Token Theft Token Theft Detection
Data Exfiltration Data Exfiltration Detection

MITRE ATT&CK Detection Matrix

The following matrix maps detection rules and investigation scenarios to relevant MITRE ATT&CK techniques.

MITRE Technique Attack Description Detection Rule Investigation Case
T1110.003 Password Spraying Password Spray Detection CASE-006 Password Spray Attack
T1078 Valid Accounts Impossible Travel Detection CASE-003 Impossible Travel Login
T1621 MFA Request Generation MFA Fatigue Detection CASE-002 MFA Fatigue Attack
T1566 Phishing Phishing Login Detection CASE-009 Phishing Attack Investigation
T1528 Steal Application Access Token Token Theft Detection CASE-008 Identity Account Compromise
T1041 Exfiltration Over Command and Control Channel Data Exfiltration Detection CASE-007 Data Exfiltration Investigation

Azure Identity and Access Management Lab

Hands on lab demonstrating identity security concepts including role based access control, authentication monitoring, and access configuration within Microsoft environments.

https://github.com/jwnfld3/azure-access-mgmt


Supporting Infrastructure Labs

These labs demonstrate the enterprise environments used to perform identity security investigations and authentication monitoring.


Windows Virtualization and Security Lab

Virtualized Windows environment used to simulate authentication activity, monitor security logs, and practice investigation techniques within a lab environment.

https://github.com/jwnfld3/windows11-hyper-v


Security Investigation Workflow

The projects in this portfolio demonstrate a structured Security Operations Center investigation process.

Detection
Security monitoring tools identify suspicious authentication activity.

Evidence Collection
Authentication logs and supporting artifacts are gathered for analysis.

Investigation
Security analysts review authentication patterns and identify indicators of compromise.

MITRE ATT&CK Mapping
Observed activity is mapped to attacker tactics and techniques.

Remediation
Incident response playbooks are used to contain and resolve security events.

Workflow Summary

Detection → Evidence → Investigation → MITRE Mapping → Remediation


Skills

Identity Security Investigation
Authentication Log Analysis
Microsoft 365 Administration
Microsoft Entra ID Identity Management
Incident Response Documentation
Security Event Correlation
Security Monitoring


Additional Areas of Experience

Microsoft 365 administration
Endpoint management using Microsoft Intune
Active Directory administration
Enterprise technical support
Security documentation and investigation reporting


Connect With Me

LinkedIn
https://linkedin.com/in/james-winfield3

GitHub Repositories
https://github.com/jwnfld3?tab=repositories


Portfolio Overview

All projects in this portfolio were developed in controlled lab environments to simulate enterprise security investigations.

These projects demonstrate practical skills used by Security Operations Center analysts including authentication monitoring, identity investigation, log analysis, incident documentation, and remediation planning.


Documentation Sources

The projects in this portfolio were developed through hands on practice and by referencing official vendor documentation and widely used cybersecurity frameworks.

Microsoft Security Documentation

Microsoft Sentinel Documentation
https://learn.microsoft.com/en-us/azure/sentinel/

Microsoft Entra ID Sign-in Log Documentation
https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-sign-ins

Microsoft Entra Conditional Access Documentation
https://learn.microsoft.com/en-us/entra/identity/conditional-access/

Kusto Query Language Documentation
https://learn.microsoft.com/en-us/azure/data-explorer/kusto/query/

Security Frameworks

MITRE ATT&CK Framework
https://attack.mitre.org/

MITRE ATT&CK Enterprise Matrix
https://attack.mitre.org/matrices/enterprise/

Additional Technical Resources

Microsoft 365 Security Documentation
https://learn.microsoft.com/en-us/microsoft-365/security/

Azure Identity Protection Documentation
https://learn.microsoft.com/en-us/entra/id-protection/


Project Transparency

All projects in this portfolio were developed in controlled lab environments for educational and professional development purposes.

The scenarios simulate common identity security incidents that security analysts investigate in enterprise Microsoft cloud environments.

Popular repositories Loading

  1. active-directory-network-lab active-directory-network-lab Public

    This repository provides scripts and configurations for setting up Active Directory (AD), DHCP, and DNS services on Windows Server environments. It simplifies the process of deploying and configuri…

    1

  2. hyper-v-windows11-lab hyper-v-windows11-lab Public

    This repository contains scripts and guidelines for setting up Windows 11 virtual machines using Hyper-V. It provides step-by-step instructions for creating and configuring Windows 11 VMs, making i…

    1

  3. windows-server-2022-active-directory windows-server-2022-active-directory Public

    Deploying Windows Server and configuring Active Directory for efficient user management, authentication, and network security.

  4. conditional-access-mfa-security conditional-access-mfa-security Public

    Ensuring secure Azure identity management with Conditional Access and MFA. Focused on enhancing security, compliance, and seamless user access.

  5. jwnfld3 jwnfld3 Public

  6. azure-identity-access-management azure-identity-access-management Public

    This repository provides tools and scripts for managing access control in Microsoft Azure, including Azure Active Directory, RBAC, and Conditional Access policies, aimed at enhancing security and a…

    1