whoami

Jawad Charafeddine_

Cybersecurity Analyst · Blue Team · SOC · Agentic AI Engineering

I work across the full blue-team lifecycle — vulnerability management, threat hunting, detection engineering, and security operations. Currently focused on building mature detection pipelines and exploring agentic AI applications in SecOps.

Jawad Charafeddine

// about

I'm a cybersecurity analyst focused on vulnerability management and security operations, with a particular interest in building detection content and automating remediation at scale.

My background spans hands-on SOC work, SIEM engineering (Microsoft Sentinel + KQL), EDR-driven threat hunting, and compliance frameworks (NIST, DISA STIG, PCI-DSS). I also maintain a home lab for continuous research — running controlled attack scenarios, analyzing network traffic, and documenting investigation workflows.

Currently building toward agentic AI applications in security operations — where LLM-driven pipelines can triage alerts, enrich context, and accelerate response at a scale that manual SOC work can't match.

I also like cats, science-fiction, and my favorite nerd font is Agave.

// experience

LogN Pacific

Cybersecurity Support Analyst

Vulnerability Management & SecOps · Contract

Dec 2025 – Present
  • 100% reduction in critical, 90% in high, 76% in medium vulns for the server team via PowerShell-based remediations.
  • Performed vulnerability assessments and risk prioritization using Tenable across Windows and Linux environments.
  • Executed DISA STIG compliance audits and automated remediation via PowerShell.
  • Performed threat hunting with EDR — detecting IoCs from brute force, data exfiltration, and ransomware.
  • Developed custom MDE detection rules to automate isolation and investigation of compromised systems.
  • Reduced brute force incidents by 100% by implementing inbound NSG/firewall rules.
  • Built Microsoft Sentinel dashboards for logon failures and malicious traffic using threat intelligence feeds.

G&E Impressions, Inc.

IT Support Specialist

May – Dec 2025
  • Supported Windows endpoints through hardware, software, and configuration issue diagnosis.
  • Applied baseline security practices: OS patching, credential hygiene, backup procedures, and access controls.
  • Documented incidents and resolutions to standardize troubleshooting workflows.

Self-directed Home Lab

Cybersecurity Analyst

SOC-focused lab environment

May 2025 – Present
  • Built and maintained a SOC-focused lab (Kali + Windows) for alert triage, host-based investigations, and network analysis.
  • Analyzed DNS/network traffic in Wireshark to identify C2 indicators and DoH visibility trade-offs.
  • Executed controlled exploitation scenarios and investigated post-compromise behavior (process execution, C2 comms).
  • Correlated host and network artifacts to assess impact, persistence, and attacker objectives.

education

University of Houston

B.S. Psychology · Biology Minor

certifications

CompTIA Security+
CompTIA CySA+
THM Cyber Security 101

// projects

// skills & tools

SIEM & Detection

Microsoft Sentinel KQL Microsoft Defender for Endpoint ELK Stack Syslog

Vuln Management

Tenable CVSS Scoring CVE/CWE DISA STIG Risk Prioritization

Frameworks

MITRE ATT&CK NIST CSF NIST 800-37 NIST 800-53 NIST 800-61 OWASP Top 10

Scripting & Automation

PowerShell Bash IAM Firewall/NSG

Compliance

PCI-DSS HIPAA GDPR ISO 27001 SOC 2

Infrastructure

Windows Linux IaaS/PaaS/SaaS OS Hardening Imaging & Deployment