Cybersecurity & Technology Risk Analyst • Tokyo, Japan
GRC | IT Risk | Incident Response | Security Operations
I am a cybersecurity and technology risk analyst with a background in financial risk, currently building hands-on experience in security operations, incident response, and governance.
Through practical training and projects, I focus on investigating security events, supporting incident response workflows, and translating technical findings into structured risk and control improvements.
- Incident Response & CSIRT support
- SIEM investigation & threat hunting
- Technology Risk & IT Governance (GRC)
- Control design and remediation tracking
Cybersecurity Analyst (Intern)
Cyber Range (LOG(N) Pacific) | Feb 2026 – Present
- Conducted SIEM-based investigations using Microsoft Sentinel and Microsoft Defender for Endpoint (MDE)
- Performed threat hunting using Advanced Hunting (KQL) aligned with MITRE ATT&CK techniques
- Analyzed endpoint telemetry across process, file, and network events
- Developed incident escalation workflows and structured investigation reports
- Supported vulnerability management and system hardening using Tenable Nessus
Focus: Endpoint telemetry analysis & threat hunting
- Investigated Tor Browser installation, execution, and network activity
- Reconstructed activity timeline using Microsoft Defender for Endpoint Advanced Hunting (KQL)
- Identified Tor relay communication over port 9001
- Mapped findings to MITRE ATT&CK techniques
➡️ https://github.com/dan-chui/Threat-Hunt-Tor-Browser-Investigation
Focus: Security monitoring & incident investigation
- Analyzed exploitation and data exfiltration scenarios
- Correlated alerts and logs to produce structured incident reports
- Demonstrates investigation workflow and escalation reasoning
➡️ https://github.com/dan-chui/SIEM-Incident-Analysis-Report
Focus: Incident response workflow & escalation
- Designed SOC Tier-1 escalation logic based on severity and SLA thresholds
- Built communication and documentation standards
- Demonstrates structured incident handling and coordination
➡️ https://github.com/dan-chui/Incident-Escalation-Playbook-Report
Focus: Risk-based remediation workflow
- Designed vulnerability prioritization and tracking methodology
- Defined remediation workflows and accountability structure
- Demonstrates practical technology risk management
➡️ https://github.com/dan-chui/Vulnerability-Management-Program
Focus: Risk identification & control mapping
- Developed structured risk register using likelihood-impact scoring
- Mapped risks to Annex A controls
- Demonstrates governance and control awareness
➡️ https://github.com/dan-chui/Risk-Register
Security Operations & Investigation
SIEM Analysis · Threat Hunting · Incident Response · MITRE ATT&CK
Technology Risk & Governance
ISO/IEC 27001 · NIST CSF · IT Controls · Risk Assessment · Vulnerability Management
Tools & Platforms
Microsoft Defender for Endpoint (MDE) · Advanced Hunting (KQL) · Microsoft Sentinel · Splunk · Tenable · Wireshark · Azure
- LinkedIn: https://www.linkedin.com/in/danchui/
- Blog: https://happy-bytes.vercel.app/
Open to Analyst-level roles in Cybersecurity, IT Risk, GRC, and CSIRT (Tokyo / Hybrid / Remote)
サイバーセキュリティ・テクノロジーリスクアナリスト|東京
金融リスクのバックグラウンドを持ち、現在はサイバーセキュリティおよびテクノロジーリスク分野で実務経験を積んでいます。
セキュリティイベントの調査、インシデント対応、ガバナンス文書化を通じて、技術的な事象をリスクおよび統制へと落とし込むことを重視しています。
- インシデント対応(CSIRT)
- SIEM分析・脅威ハンティング
- テクノロジーリスク・ITガバナンス
- 統制設計・是正対応
サイバーセキュリティアナリスト(インターン)
Cyber Range(LOG(N) Pacific)
- Microsoft Sentinel / Microsoft Defender for Endpoint(MDE)を用いたログ調査
- MITRE ATT&CKに基づく脅威ハンティング
- エンドポイントログ分析(プロセス・ファイル・ネットワーク)
- インシデント対応およびエスカレーション設計
- Tenableを用いた脆弱性管理およびハードニング
セキュリティ運用
SIEM分析 · 脅威ハンティング · インシデント対応
テクノロジーリスク
ISO27001 · NIST CSF · IT統制 · リスク評価
ツール
Microsoft Defender for Endpoint(MDE)・KQL(Advanced Hunting)・Sentinel・Splunk・Tenable・Wireshark
サイバーセキュリティ、ITリスク、GRC、CSIRT関連のアナリストポジションを志向しています。
