Skip to content
View dan-chui's full-sized avatar

Block or report dan-chui

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
dan-chui/README.md

Hi, I'm Dan 👋

Cybersecurity & Technology Risk Analyst • Tokyo, Japan
GRC | IT Risk | Incident Response | Security Operations


I am a cybersecurity analyst with a background in financial risk, currently building hands-on experience in security operations, incident response, and technology risk.

My work focuses on alert triage, investigation, and escalation workflows, as well as translating technical findings into structured risk and control improvements.


🎯 Current Focus

  • Incident Response & CSIRT support
  • SIEM investigation, alert triage & threat hunting
  • Technology Risk & IT Governance (GRC)
  • Control design and remediation tracking

🧪 Practical Experience

Cybersecurity Analyst (Intern)
Cyber Range (LOG(N) Pacific) | Feb 2026 – Present

  • Conducted SIEM-based investigations and alert triage using Microsoft Sentinel and Defender for Endpoint (MDE)
  • Performed threat hunting using Advanced Hunting (KQL) aligned with MITRE ATT&CK
  • Analyzed endpoint telemetry (process, file, network) to identify suspicious activity
  • Documented investigation findings and supported escalation decisions based on severity and risk
  • Performed vulnerability assessment and remediation using Tenable Nessus, including system hardening

📂 Selected Security & Governance Projects

🔎 SOC Threat Hunting & Incident Investigation: Tor Browser Activity

Focus: Endpoint telemetry analysis & SOC workflow

  • Conducted end-to-end investigation including alert triage, timeline reconstruction, and severity assessment
  • Analyzed Tor Browser download, execution, and network activity using Microsoft Defender Advanced Hunting (KQL)
  • Identified Tor relay communication over port 9001
  • Assessed activity as non-malicious but potentially policy-violating and escalated for review
  • Mapped findings to MITRE ATT&CK techniques

➡️ https://github.com/dan-chui/Threat-Hunt-Tor-Browser-Investigation


🔍 SIEM Incident Analysis Report

Focus: Security monitoring & incident investigation

  • Analyzed exploitation and data exfiltration scenarios
  • Correlated alerts and logs to produce structured incident reports
  • Demonstrates alert triage, investigation workflow, and escalation decision-making

➡️ https://github.com/dan-chui/SIEM-Incident-Analysis-Report


🚨 Incident Escalation Playbook

Focus: Incident response workflow & escalation

  • Designed SOC Tier-1 escalation logic based on severity and SLA thresholds
  • Built communication and documentation standards
  • Demonstrates structured incident handling and coordination

➡️ https://github.com/dan-chui/Incident-Escalation-Playbook-Report


🛡 Vulnerability Management Program

Focus: Risk-based remediation workflow

  • Designed vulnerability prioritization and tracking methodology
  • Defined remediation workflows and accountability structure
  • Demonstrates practical technology risk management

➡️ https://github.com/dan-chui/Vulnerability-Management-Program


🛡 ISO/IEC 27001 Risk Register

Focus: Risk identification & control mapping

  • Developed structured risk register using likelihood-impact scoring
  • Mapped risks to Annex A controls
  • Demonstrates governance and control awareness

➡️ https://github.com/dan-chui/Risk-Register


🧰 Skills & Tools

Security Operations & Investigation
SIEM Analysis · Alert Triage · Threat Hunting · Incident Response · MITRE ATT&CK

Technology Risk & Governance
ISO/IEC 27001 · NIST CSF · IT Controls · Risk Assessment · Vulnerability Management

Tools & Platforms
Microsoft Defender for Endpoint (MDE) · Advanced Hunting (KQL) · Microsoft Sentinel · Splunk · Tenable · Wireshark · Azure


📬 Contact


Open to Analyst-level roles in Cybersecurity, IT Risk, GRC, and CSIRT (Tokyo / Hybrid / Remote)


🇯🇵 日本語版 README


Danです 👋

サイバーセキュリティ・テクノロジーリスクアナリスト|東京


金融リスクのバックグラウンドを持ち、現在はサイバーセキュリティおよびテクノロジーリスク分野で実務経験を積んでいます。

アラートトリアージ、インシデント調査、エスカレーション判断を含むSOC業務フローに基づいた実務対応に強みがあります。技術的な事象をリスクおよび統制へと落とし込むことを重視しています。


現在のフォーカス

  • インシデント対応(CSIRT)
  • SIEM分析・アラートトリアージ・脅威ハンティング
  • テクノロジーリスク・ITガバナンス
  • 統制設計・是正対応

実務トレーニング

サイバーセキュリティアナリスト(インターン)
Cyber Range(LOG(N) Pacific)

  • Microsoft Sentinel / Defender for Endpointを用いたログ調査およびアラートトリアージ
  • MITRE ATT&CKに基づく脅威ハンティング
  • エンドポイントログ分析(プロセス・ファイル・ネットワーク)
  • インシデント対応およびエスカレーション判断の実施
  • Tenableを用いた脆弱性管理およびハードニング

スキル

セキュリティ運用
SIEM分析 · アラートトリアージ · 脅威ハンティング · インシデント対応

テクノロジーリスク
ISO27001 · NIST CSF · IT統制 · リスク評価

ツール
Microsoft Defender for Endpoint(MDE)・KQL(Advanced Hunting)・Sentinel・Splunk・Tenable・Wireshark


サイバーセキュリティ、ITリスク、GRC、CSIRT関連のアナリストポジションを志向しています。

Pinned Loading

  1. Threat-Hunt-Tor-Browser-Investigation Threat-Hunt-Tor-Browser-Investigation Public

    Threat hunting investigation analyzing Tor Browser activity using Microsoft Defender (KQL) with MITRE ATT&CK mapping and incident reporting.

  2. SIEM-Incident-Analysis-Report SIEM-Incident-Analysis-Report Public

    SIEM-based incident investigation analyzing exploitation and data exfiltration scenarios with structured reporting and alert correlation.

  3. Incident-Escalation-Playbook-Report Incident-Escalation-Playbook-Report Public

    SOC incident response playbook defining escalation workflows, severity classification, and SLA-driven decision-making processes.

  4. Vulnerability-Management-Program Vulnerability-Management-Program Public

    Risk-based vulnerability management framework covering identification, prioritization, remediation tracking, and reporting workflows.

    1

  5. Risk-Register Risk-Register Public

    ISO/IEC 27001-aligned risk register with likelihood-impact scoring and control mapping to Annex A security controls.