Hermon Woldemichael
Network Threat Hunter
Network Threat Analyst focused on network threat hunting, malware traffic analysis, zeek log analysis & scripting, and adversary behavior analysis.
Latest Research
View all postsResearch Focus
Network traffic analysis · Threat detection methodologies · Malware behavior patterns · Log analysis and correlation · Zeek script development · Malware Analysis · Adversary tactics and procedures · Detection engineering
About
This blog documents my research, analysis techniques, and lessons learned in the field of network threat hunting. Each post aims to provide actionable insights and practical methodologies for security practitioners.
Get in touch