I didn't grow up decrypting military files in a dark basement with six screens (though that would've been cool). I started in IT support—resetting passwords, fixing printers, and occasionally feeling like a digital detective. But even back then, there was this nagging thought: "What if I could do more than just fix? What if I could defend?"
That thought became an obsession.
I started pulling the threads. Zeek logs? Pulled. VirusTotal scans? Obsessed. Azure Sentinel dashboards? Injected directly into my veins. I wasn't just learning—I was building my toolkit, one log file and late-night Google search at a time.
So I made this blog. Not for polished, perfect answers, but to document the hustle. It's where I translate my mistakes, experiments, and breakthroughs into something raw and useful—for anyone else trudging through the fog of firewalls and packet captures.