$ 1 NAME
yaron-king — a defender with an attacker mindset. Twenty years in cybersecurity, currently a senior blue-teamer at a financial / government institute.
$ 2 SYNOPSIS
I think red-team and blue-team are two sides of the same coin, and that the practitioners I trust most have spent serious time on both. This site is where I write about the defensive work I do — and the offensive techniques I study to do it well.
My posts are technical, code-first, and aimed at fellow practitioners and people learning the field. If a post can't be reproduced from the words, I haven't finished writing it.
$ 3 BACKGROUND
I started broad-spectrum at a governmental ISP, in a multi-faceted role that rotated me through Helpdesk, SOC, NOC, and AOC. Several years of seeing every layer of how an enterprise actually runs — the right foundation, in retrospect, for the rest of this career.
From there I joined the cyber-security team of a financial / government institute, and I've been there since. The work has moved with the field: I helped implement and administer IAM and endpoint-protection solutions across the org, then pulled SIEM integration in and started writing detection rules. These days I'm focused on detection engineering and SOAR automation.
In parallel, I've taken courses across web hacking, infrastructure hacking, malware analysis, and reverse engineering — because you can't engineer detections for techniques you don't understand.
$ 4 EXPERTISE
- BLUE-TEAM CRAFT
- Detection engineering, SOAR automation, SIEM rule design.
- IDENTITY (IAM)
- Implementation & admin of identity and access controls across the organization.
- ENDPOINT
- Org-wide endpoint-protection rollout and operational tuning.
- IR & FORENSICS
- Incident response and post-incident analysis. Timelines, root-cause, follow-up detections.
- MALWARE ANALYSIS
- Static and dynamic analysis. Reverse engineering when the sample warrants it.
- RED-TEAM (curiosity)
- Small internal pen-tests with open-source tooling — to keep the defender honest.
$ 5 HIGHLIGHTS
- ENDPOINT @ ORG-SCALE
- Implementation of the endpoint-security solution across the entire organization — rollout, tuning, and the slow patient work of getting it useful in production.
- VISIBILITY
- Enhancing org-wide visibility via comprehensive log audit, including Sysmon. Turning “we have logs” into “we have signal.”
- SOAR
- Building SOAR automations so the SOC's repetitive work runs itself, and the analysts get to spend their attention on the things that actually need it.
- INTERNAL PENTESTS
- Running small internal pen-tests with open-source tooling — finding gaps in our own controls before someone else does.
$ 6 EDUCATION
- M.Sc.
- Computer Science.
- B.Sc.
- Computer Science.
- SANS FOR610
- Reverse-Engineering Malware: Malware Analysis Tools and Techniques.
- ONGOING
- Vendor courses across web hacking, infrastructure hacking, malware analysis & RE.
$ 7 TALKS
$ 8 CONTACT
Best way to reach me is by replying to a post on GitHub — Issues are public, which keeps the conversation useful for everyone else who ends up here. Otherwise: @Sam0rai on the usual social platforms.