THREAT

CASE 004

Role: Analyst

Team: Blue

Eulyz.com

A sharp, professional photograph of George Byrd sitting in a modern workstation, illuminated by the muted sea teal glow of dual monitors displaying network traffic maps. He is wearing a dark charcoal sweater, reflecting a serious and focused atmosphere.
A sharp, professional photograph of George Byrd sitting in a modern workstation, illuminated by the muted sea teal glow of dual monitors displaying network traffic maps. He is wearing a dark charcoal sweater, reflecting a serious and focused atmosphere.
As part of the intensive Cyber Challenge IV, I led the defensive response for a simulated municipal power grid. This phase focused on identifying lateral movement and deploying firewall rules to isolate compromised nodes.

Outcome: 100% detection rate during the final APT simulation event.
VIEW LOGS
A close-up photograph of a server rack with blinking silver and ice white status lights in a dim, dark charcoal data center, emphasizing precision and secure infrastructure.
A close-up photograph of a server rack with blinking silver and ice white status lights in a dim, dark charcoal data center, emphasizing precision and secure infrastructure.
A macro photograph of a high-quality mechanical keyboard on a dark charcoal desk, with soft ice white backlighting highlighting the keycaps, representing the technical nature of the work.
A macro photograph of a high-quality mechanical keyboard on a dark charcoal desk, with soft ice white backlighting highlighting the keycaps, representing the technical nature of the work.
An eye-level shot of a professional cybersecurity lab, featuring silver laptops and muted sea teal colored cables organized neatly in a modern, clean environment.
An eye-level shot of a professional cybersecurity lab, featuring silver laptops and muted sea teal colored cables organized neatly in a modern, clean environment.

We utilized advanced forensics tools to trace the attack vector back to a phishing entry point, ensuring future resilience.

METHOD

To ensure maximum security, I implemented a zero-trust architecture across the test environment, utilizing ice white and silver hardware keys for multi-factor authentication.

A top-down photograph of a silver tablet and a professional black ink pen resting on a light off-white desk, surrounded by notes on cybersecurity protocols.
A top-down photograph of a silver tablet and a professional black ink pen resting on a light off-white desk, surrounded by notes on cybersecurity protocols.
A wide-angle professional photo of an empty, high-tech command center with dark charcoal walls and several large screens displaying clean, modern data visualizations in muted teal.
A wide-angle professional photo of an empty, high-tech command center with dark charcoal walls and several large screens displaying clean, modern data visualizations in muted teal.

My final analysis report was utilized by the certificate program leads as a benchmark for excellence in technical communication and threat mitigation.