I investigate alerts, analyze memory/disk/network artifacts, and turn evidence into timelines and detections.
Tools: Volatility • FTK Imager • Zeek • RITA/AC-Hunter • Splunk
Focus: Memory & disk forensics • Network forensics • Threat hunting • MITRE ATT&CK mapping
- DFIR-Labs → cases, IOCs, ATT&CK, and operational detections (Splunk/Sigma)
https://github.com/LuCamachoJr/DFIR-Labs - Latest case: Windows Memory Forensics — Suspicious PowerShell Beaconing
PDF + notes:DFIR-Labs/cases/2025-08-22-WinMem-PowerShell-Beaconing/
- Splunk searches:
DFIR-Labs/detections/splunk/
- Sigma rules:
DFIR-Labs/detections/sigma/
LinkedIn: https://www.linkedin.com/in/lcamachojr/