Threat Hunting
Hypothesis-driven hunts using ATT&CK, Sigma, KQL, and Zeek/Suricata artifacts.
AI-powered defense • DFIR • Purple Teaming • Proxmox & Azure Lab • Ransomware Reverse Engineering
I'm Quenton (“SecurityQ”), a Cybersecurity Engineer & Threat Hunter focused on threat-informed, AI-driven defense. I build hands-on labs (Proxmox, Security Onion, Wazuh), automate investigations with Python, and connect signals across logs, memory, and network telemetry to reduce time-to-detect and time-to-contain.
Hypothesis-driven hunts using ATT&CK, Sigma, KQL, and Zeek/Suricata artifacts.
Python tooling for IOC triage, timeline building, and evidence packaging.
Microsoft 365/XDR, Entra ID P2, Conditional Access, Defender for Cloud.
LLM-assisted playbooks, CUDA-accelerated workloads, model guardrails.
Automated evidence collector & timeline builder. Packages artifacts for legal submission with hash manifests.
GitHubHands-on environment to test LLM prompt-injection defenses, OSINT enrichment, and policy-based red teaming.
GitHubProxmox + Security Onion + Wazuh with SPAN VLANs, GPU-assisted inference, and daily threat reports.
GitHubGrab a PDF version or view highlights below.
Download PDFFor opportunities, collaborations, or speaking requests: