Picture of Me!

Hey! I'm Benjamin Anderson ðŸ‘‹

I am an IT Professional driven by a passion for creating secure, scalable solutions that make a meaningful impact. I enjoy using technology to simplify life, solve real problems, and help others.

This is my technology stack

Html Logo
HTML
CSS Logo
CSS
JavaScript Logo
JavaScript
Python Logo
Python
Nodejs Logo
NodeJS
Swift Logo
Swift
Java Logo
Java
React Logo
React

Here are some of my projects

  • View project DFIR AI Assistant

    DFIR AI Assistant

    Html, CSS, JavaScript, Python, FastAPI, SQLite, MITRE ATT&CK Framework

    The DFIR AI Assistant is a security investigation tool I built to automate parts of the digital forensics and incident response workflow. It ingests Windows event logs, detects suspicious activity such as brute force attempts, encoded PowerShell execution, and possible lateral movement, then generates a structured case report with a timeline of events and key indicators of compromise. A SOC-style dashboard allows analysts to review cases and investigate findings.

  • View project AWS CloudTrail Threat Detection Pipeline

    AWS CloudTrail Threat Detection Pipeline

    AWS CloudTrail, S3, EventBridge, Lambda, DynamoDB, Cloudwatch, AWS CLI, Terraform

    This project documents the design and implementation of a cloud-native detection pipeline in AWS. The goal was to simulate sensitive API activity, detect it in near real-time, and store structured alert data for analysis. Rather than simply provisioning resources, this lab demonstrates how activity inside an AWS account can be monitored, detected, and preserved for investigation.

  • View project Vulnerability Management Program

    Vulnerability Management Program

    Tenable, Azure Virtual Machines, PowerShell & BASH

    In this project, I simulate the implementation of a comprehensive vulnerability management program, from inception to completion. Inception State: the organization has no existing policy or vulnerability management practices in place. Completion State: a formal policy is enacted, stakeholder buy-in is secured, and a full cycle of organization-wide vulnerability remediation is successfully completed.

  • View project Threat Hunt Report: Unauthorized TOR Usage

    Threat Hunt Report: Unauthorized TOR Usage

    Windows 11 VM (Azure), Microsoft Defender for Endpoint, KQL, Tor Browser

    A real-world threat hunting scenario investigating unauthorized TOR browser installation and network activity to detect and analyze TOR usage in enterprise telemetry.

Here are some of my technology certifications

AWS Certified Cloud Practitioner
AWS Certified Cloud Practitioner
CompTIA Network+
CompTIA Network+
CompTIA Security+
CompTIA Security+
JavaScript Logo
ISC2 Certified in Cybersecurity
ITIL Foundation
ITIL 4 Foundation
Linux Essentials
LPI Linux Essentials
Security Blue Team BTL1
Security Blue Team BTL1
Splunk Core Certified User
Splunk Core Certified User