Hermon Woldemichael

Network Threat Hunter

Network Threat Analyst focused on network threat hunting, malware traffic analysis, zeek log analysis & scripting, and adversary behavior analysis.

Latest Research

View all posts

Research Focus

Network traffic analysis · Threat detection methodologies · Malware behavior patterns · Log analysis and correlation · Zeek script development · Malware Analysis · Adversary tactics and procedures · Detection engineering

About

This blog documents my research, analysis techniques, and lessons learned in the field of network threat hunting. Each post aims to provide actionable insights and practical methodologies for security practitioners.

Get in touch