usrtem
Aspiring Cybersecurity Analyst | B.S. Cyber Ops (Utica) | Malware • AI • Forensics • Risk | CTF Lead | Open to roles in SOC, Threat Intel, or DFIR
Binghamton, NY
Pinned Repositories
README
This is an overview of my portfolio with my repositories.
AI-Cybersecurity-Research
White-paper & talk covering benefits, risks, and mitigation frameworks for AI and LLMs in cybersecurity (NIST AI RMF, OWASP Top 10 for LLMs, MITRE ATLAS, real-world case studies)
Conti-Leak-Analysis
In-depth analysis of the Conti ransomware gang based on their leaked internal Jabber chat logs. Includes organizational structure, operational tactics, key actors, and negotiation strategies.
Cyber-Incident-Alert-Breach
Simulated university emergency alert system infiltration walkthrough, covering attacker tactics, system isolation steps, remediation actions, and cybersecurity policy enhancements. Includes narrated presentation (external link) and actionable response plan for future incidents.
Cyber-Risk-Management-Plan
A structured cyber risk management plan modeled on NIST guidance. Includes threat identification, impact assessment, control mapping, and mitigation strategies.
Digital-Forensics-Labwork
A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and command-line utilities.
LokiBot-Malware-Analysis
Static and behavioral malware analysis of LokiBot using FlareVM, REMnux, VirusTotal, and Hybrid Analysis. Includes MITRE ATT&CK mapping and prevention guidance.
Malware-Classification-Qilin
Comparative overview of malware types with a case study on Qilin ransomware operations, tooling, and tactics. Includes behavioral analysis and threat trends.
Malware-Network-Analysis
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
QuickResources
I like to play with html, so I created a favorites list, never ending and not completely inclusive, of some of my favorite cyber resources.
usrtem's Repositories
usrtem/README
This is an overview of my portfolio with my repositories.
usrtem/Cyber-Incident-Alert-Breach
Simulated university emergency alert system infiltration walkthrough, covering attacker tactics, system isolation steps, remediation actions, and cybersecurity policy enhancements. Includes narrated presentation (external link) and actionable response plan for future incidents.
usrtem/Malware-Network-Analysis
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
usrtem/LokiBot-Malware-Analysis
Static and behavioral malware analysis of LokiBot using FlareVM, REMnux, VirusTotal, and Hybrid Analysis. Includes MITRE ATT&CK mapping and prevention guidance.
usrtem/Static-Malware-Analysis
This repository contains two static malware analysis labs: one exploring Emotet using VirusTotal and Hybrid Analysis, and another focused on keylogger dissection using REMnux and PEStudio.
usrtem/Digital-Forensics-Labwork
A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and command-line utilities.
usrtem/Cyber-Risk-Management-Plan
A structured cyber risk management plan modeled on NIST guidance. Includes threat identification, impact assessment, control mapping, and mitigation strategies.
usrtem/Malware-Classification-Qilin
Comparative overview of malware types with a case study on Qilin ransomware operations, tooling, and tactics. Includes behavioral analysis and threat trends.
usrtem/Conti-Leak-Analysis
In-depth analysis of the Conti ransomware gang based on their leaked internal Jabber chat logs. Includes organizational structure, operational tactics, key actors, and negotiation strategies.
usrtem/course-highlights
Summary of key cybersecurity, programming, and digital forensics courses completed at Utica University as part of the B.S. in Cybersecurity (Cyber Operations). Highlights include AI security, OSINT, malware analysis, and applied risk management using NIST frameworks.
usrtem/ResearchAI
AI-powered document analysis tool for querying content across PDFs, Word files, Excel sheets, text files, and web URLs using Google’s Gemini API.
usrtem/SimplePort
Python-based TCP port scanner with customizable ranges, service detection, real-time output, and timestamped logging — built for ethical security testing and training.
usrtem/AI-Cybersecurity-Research
White-paper & talk covering benefits, risks, and mitigation frameworks for AI and LLMs in cybersecurity (NIST AI RMF, OWASP Top 10 for LLMs, MITRE ATLAS, real-world case studies)
usrtem/TrickBot-Analysis
In-depth malware research report analyzing TrickBot's evolution from a banking trojan to a modular threat tool used in ransomware campaigns. Covers threat actor attribution, MITRE ATT&CK mapping, propagation techniques, and defensive strategies.
usrtem/QuickResources
I like to play with html, so I created a favorites list, never ending and not completely inclusive, of some of my favorite cyber resources.