Skip to content
View dan-chui's full-sized avatar

Block or report dan-chui

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
dan-chui/README.md

Hi, I'm Dan 👋

Cybersecurity & Technology Risk Analyst • Tokyo, Japan
GRC | IT Risk | Incident Response | Security Operations


I am a cybersecurity and technology risk analyst with a background in financial risk, currently building hands-on experience in security operations, incident response, and governance.

Through practical training and projects, I focus on investigating security events, supporting incident response workflows, and translating technical findings into structured risk and control improvements.


🎯 Current Focus

  • Incident Response & CSIRT support
  • SIEM investigation & threat hunting
  • Technology Risk & IT Governance (GRC)
  • Control design and remediation tracking

🧪 Practical Experience

Cybersecurity Analyst (Intern)
Cyber Range (LOG(N) Pacific) | Feb 2026 – Present

  • Conducted SIEM-based investigations using Microsoft Sentinel and Microsoft Defender for Endpoint (MDE)
  • Performed threat hunting using Advanced Hunting (KQL) aligned with MITRE ATT&CK techniques
  • Analyzed endpoint telemetry across process, file, and network events
  • Developed incident escalation workflows and structured investigation reports
  • Supported vulnerability management and system hardening using Tenable Nessus

📂 Selected Security & Governance Projects

🔎 Threat Hunting Investigation: Tor Browser Activity

Focus: Endpoint telemetry analysis & threat hunting

  • Investigated Tor Browser installation, execution, and network activity
  • Reconstructed activity timeline using Microsoft Defender for Endpoint Advanced Hunting (KQL)
  • Identified Tor relay communication over port 9001
  • Mapped findings to MITRE ATT&CK techniques

➡️ https://github.com/dan-chui/Threat-Hunt-Tor-Browser-Investigation


🔍 SIEM Incident Analysis Report

Focus: Security monitoring & incident investigation

  • Analyzed exploitation and data exfiltration scenarios
  • Correlated alerts and logs to produce structured incident reports
  • Demonstrates investigation workflow and escalation reasoning

➡️ https://github.com/dan-chui/SIEM-Incident-Analysis-Report


🚨 Incident Escalation Playbook

Focus: Incident response workflow & escalation

  • Designed SOC Tier-1 escalation logic based on severity and SLA thresholds
  • Built communication and documentation standards
  • Demonstrates structured incident handling and coordination

➡️ https://github.com/dan-chui/Incident-Escalation-Playbook-Report


🛡 Vulnerability Management Program

Focus: Risk-based remediation workflow

  • Designed vulnerability prioritization and tracking methodology
  • Defined remediation workflows and accountability structure
  • Demonstrates practical technology risk management

➡️ https://github.com/dan-chui/Vulnerability-Management-Program


🛡 ISO/IEC 27001 Risk Register

Focus: Risk identification & control mapping

  • Developed structured risk register using likelihood-impact scoring
  • Mapped risks to Annex A controls
  • Demonstrates governance and control awareness

➡️ https://github.com/dan-chui/Risk-Register


🧰 Skills & Tools

Security Operations & Investigation
SIEM Analysis · Threat Hunting · Incident Response · MITRE ATT&CK

Technology Risk & Governance
ISO/IEC 27001 · NIST CSF · IT Controls · Risk Assessment · Vulnerability Management

Tools & Platforms
Microsoft Defender for Endpoint (MDE) · Advanced Hunting (KQL) · Microsoft Sentinel · Splunk · Tenable · Wireshark · Azure


📬 Contact


Open to Analyst-level roles in Cybersecurity, IT Risk, GRC, and CSIRT (Tokyo / Hybrid / Remote)


🇯🇵 日本語版 README


Danです 👋

サイバーセキュリティ・テクノロジーリスクアナリスト|東京


金融リスクのバックグラウンドを持ち、現在はサイバーセキュリティおよびテクノロジーリスク分野で実務経験を積んでいます。

セキュリティイベントの調査、インシデント対応、ガバナンス文書化を通じて、技術的な事象をリスクおよび統制へと落とし込むことを重視しています。


現在のフォーカス

  • インシデント対応(CSIRT)
  • SIEM分析・脅威ハンティング
  • テクノロジーリスク・ITガバナンス
  • 統制設計・是正対応

実務トレーニング

サイバーセキュリティアナリスト(インターン)
Cyber Range(LOG(N) Pacific)

  • Microsoft Sentinel / Microsoft Defender for Endpoint(MDE)を用いたログ調査
  • MITRE ATT&CKに基づく脅威ハンティング
  • エンドポイントログ分析(プロセス・ファイル・ネットワーク)
  • インシデント対応およびエスカレーション設計
  • Tenableを用いた脆弱性管理およびハードニング

スキル

セキュリティ運用
SIEM分析 · 脅威ハンティング · インシデント対応

テクノロジーリスク
ISO27001 · NIST CSF · IT統制 · リスク評価

ツール
Microsoft Defender for Endpoint(MDE)・KQL(Advanced Hunting)・Sentinel・Splunk・Tenable・Wireshark


サイバーセキュリティ、ITリスク、GRC、CSIRT関連のアナリストポジションを志向しています。

Pinned Loading

  1. Threat-Hunt-Tor-Browser-Investigation Threat-Hunt-Tor-Browser-Investigation Public

    Threat hunting investigation analyzing Tor Browser activity using Microsoft Defender (KQL) with MITRE ATT&CK mapping and incident reporting.

  2. SIEM-Incident-Analysis-Report SIEM-Incident-Analysis-Report Public

    SIEM-based incident investigation analyzing exploitation and data exfiltration scenarios with structured reporting and alert correlation.

  3. Incident-Case-Report-Tor-Investigation Incident-Case-Report-Tor-Investigation Public

    End-to-end incident investigation of Tor Browser activity using Microsoft Defender XDR, KQL, and MITRE ATT&CK mapping.

  4. Incident-Escalation-Playbook-Report Incident-Escalation-Playbook-Report Public

    SOC incident response playbook defining escalation workflows, severity classification, and SLA-driven decision-making processes.

  5. Vulnerability-Management-Program Vulnerability-Management-Program Public

    Risk-based vulnerability management framework covering identification, prioritization, remediation tracking, and reporting workflows.

  6. Risk-Register Risk-Register Public

    ISO/IEC 27001-aligned risk register with likelihood-impact scoring and control mapping to Annex A security controls.