Skip to content
View stefanieversace's full-sized avatar
  • New York City
  • 16:02 (UTC -04:00)

Block or report stefanieversace

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
stefanieversace/README.md

Hi, I'm Stefanie ๐Ÿ‘‹

Aspiring SOC Analyst | Threat Intelligence | Microsoft Sentinel (KQL)

Security Studies graduate with a strong interest in cybersecurity, threat intelligence, and AI-driven analysis.

Iโ€™m currently building hands-on experience across detection engineering, OSINT investigations, and security data analysis โ€” with a focus on turning intelligence into real-world security insights.


๐Ÿง  Current Focus

  • Threat intelligence research & OSINT investigations
  • Detection engineering using Microsoft Sentinel (KQL)
  • Security log analysis & behavioural detection
  • AI-assisted investigation workflows

๐Ÿ“‚ Projects

๐Ÿ”น Gootloader Threat Intelligence & Detection Analysis

Developed an OSINT-driven threat profile analysing the Gootloader infection chain, mapped behaviours to MITRE ATT&CK, and created Microsoft Sentinel detection logic to identify related activity.

๐Ÿ”น Security Operations Triage Dashboard

Built a Microsoft Sentinel project using KQL to simulate real-world SOC workflows, including detection of brute force activity, suspicious logins, and lateral movement. Designed triage processes to prioritise and investigate security alerts.

๐Ÿ”น Threat Intelligence Tracker

Researched and documented emerging cyber threats, techniques, and indicators, focusing on identifying patterns and translating intelligence into actionable insights.

๐Ÿ”น Security Log Analysis Lab

Conducted hands-on analysis of security logs to investigate suspicious activity, using KQL queries and event data to identify anomalies and support incident investigation.

๐Ÿ”น AI Contract Data Extraction

Used prompt engineering to transform unstructured legal text into structured data, demonstrating the application of AI for data analysis and automation.

๐Ÿ”น AI Recommendation Prompt Lab

Designed and tested prompt workflows to generate personalised recommendations, exploring how AI can be used to structure and interpret user data.


โšก Interests

Cybersecurity โ€ข Threat Intelligence โ€ข Artificial Intelligence โ€ข Data Analysis


๐ŸŽฏ Currently Seeking

Opportunities in:

  • Security Operations (SOC)
  • Threat Intelligence
  • Cybersecurity Analysis

๐Ÿ“ Open to roles in New York

Pinned Loading

  1. Global-Threat-Monitoring-Dashboard-OSINT- Global-Threat-Monitoring-Dashboard-OSINT- Public

    OSINT threat monitoring dashboard for global risk analysis and daily intelligence brief generation

    Python

  2. ai-contract-data-extraction ai-contract-data-extraction Public

    Using AI prompts to extract structured information from unstructured text.

    Python

  3. Security-Operations-Triage-Dashboard-in-Microsoft-Sentinel Security-Operations-Triage-Dashboard-in-Microsoft-Sentinel Public

    Built a Microsoft Sentinel project using KQL to simulate real-world SOC workflows, including detection of brute force activity, suspicious logins, and lateral movement. Mapped detections to MITRE Aโ€ฆ

  4. ai-recommendation-prompt-lab ai-recommendation-prompt-lab Public

    Exploring how AI prompts can generate personalized recommendations from user preferences and behavior signals.

    Python

  5. security-log-analysis security-log-analysis Public

    Security log analysis project exploring how to investigate suspicious activity using log data. Includes sample security events, KQL queries, and investigation notes demonstrating how patterns and aโ€ฆ

  6. Threat-Actor-Profile-Gootloader Threat-Actor-Profile-Gootloader Public

    OSINT and detection engineering analysis of Gootloader, including infection chain, MITRE ATT&CK mapping, IOCs, and Microsoft Sentinel KQL queries.