Skip to content
View LuCamachoJr's full-sized avatar

Block or report LuCamachoJr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
LuCamachoJr/README.md

Luis Camacho Jr. — Junior SOC/DFIR

I investigate alerts, analyze memory/disk/network artifacts, and turn evidence into timelines and detections.

Tools: Volatility • FTK Imager • Zeek • RITA/AC-Hunter • Splunk
Focus: Memory & disk forensics • Network forensics • Threat hunting • MITRE ATT&CK mapping

Portfolio

  • DFIR-Labs → cases, IOCs, ATT&CK, and operational detections (Splunk/Sigma)
    https://github.com/LuCamachoJr/DFIR-Labs
  • Latest case: Windows Memory Forensics — Suspicious PowerShell Beaconing
    PDF + notes: DFIR-Labs/cases/2025-08-22-WinMem-PowerShell-Beaconing/

Detections

  • Splunk searches: DFIR-Labs/detections/splunk/
  • Sigma rules: DFIR-Labs/detections/sigma/

Connect

LinkedIn: https://www.linkedin.com/in/lcamachojr/

Pinned Loading

  1. DFIR-Labs DFIR-Labs Public

    DFIR portfolio: investigation cases with IOCs & ATT&CK, plus operational detections (Splunk/Sigma).