Jason Eiler Cybersecurity Portfolio

Where data travels, security must follow.

My Cybersecurity Projects

Incident Response Exercise 2: Analyzing a Malicious IP Alert

In this incident response exercise, we’re tasked with investigating a suspicious alert triggered by a connection to a potentially malicious IP...

Investigating a Malicious Connection: Incident Response Exercise 1

🔍 Introduction In this incident response exercise, we are tasked with investigating a suspicious alert triggered by a connection to an IP address...