Skip to content
View dan-chui's full-sized avatar

Block or report dan-chui

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
dan-chui/README.md

Hi, I'm Dan 👋

Technology Risk & Cybersecurity Analyst • Tokyo, Japan
GRC | IT Risk | Incident Response | Security Governance


Former Investment Bank Director with 15+ years of experience in financial risk governance, regulatory examination support, and internal control environments.

I focus on the intersection of technology risk, cybersecurity operations, and governance, translating technical findings into structured risk assessments, control frameworks, and escalation-ready reporting.


🎯 Current Focus

  • Technology Risk & IT Governance (GRC)
  • Incident Response & CSIRT support
  • Threat Hunting & SIEM Investigation
  • Control Design & Risk-Based Remediation

🧪 Practical Experience

Cybersecurity Analyst (Intern)
Cyber Range (LOG(N) Pacific) | Feb 2026 – Present

  • Conducted SIEM-based investigations using Microsoft Sentinel, Defender for Endpoint, and Azure
  • Performed threat hunting aligned with MITRE ATT&CK techniques
  • Analyzed endpoint telemetry across process, file, and network events
  • Developed incident escalation workflows and investigation reports
  • Supported vulnerability management and system hardening exercises using Tenable Nessus

📂 Selected Security & Governance Projects

🔎 Threat Hunting Investigation: Tor Browser Activity

Focus: Endpoint telemetry analysis & threat hunting

  • Investigated Tor Browser installation, execution, and network activity
  • Reconstructed timeline using Microsoft Defender Advanced Hunting (KQL)
  • Identified Tor relay communication over port 9001
  • Mapped findings to MITRE ATT&CK techniques

➡️ https://github.com/dan-chui/Threat-Hunt-Tor-Browser-Investigation


🔍 SIEM Incident Analysis Report

Focus: Security monitoring & incident investigation

  • Analyzed simulated exploitation and data exfiltration scenarios
  • Correlated logs and alerts to produce structured incident reports
  • Demonstrates investigation workflow and escalation reasoning

➡️ https://github.com/dan-chui/SIEM-Incident-Analysis-Report


🚨 Incident Escalation Playbook

Focus: Incident response governance & workflow design

  • Designed SOC Tier-1 escalation logic aligned with severity and SLA thresholds
  • Built communication matrix and documentation standards
  • Emphasized cross-team coordination and governance

➡️ https://github.com/dan-chui/Incident-Escalation-Playbook-Report


🛡 Vulnerability Management Program

Focus: Technology risk & remediation lifecycle

  • Designed risk-based vulnerability prioritization and tracking methodology
  • Defined remediation workflows and accountability structure
  • Demonstrates operational risk governance

➡️ https://github.com/dan-chui/Vulnerability-Management-Program


🛡 ISO/IEC 27001 Risk Register

Focus: Risk identification & control mapping

  • Developed structured risk register using Likelihood × Impact scoring
  • Mapped risks to Annex A controls
  • Demonstrates audit-ready governance documentation

➡️ https://github.com/dan-chui/Risk-Register


🧰 Skills & Tools

Security Operations & Investigation
SIEM Analysis · Threat Hunting · Incident Response · MITRE ATT&CK

Technology Risk & Governance
ISO/IEC 27001 · NIST CSF · IT Controls · Risk Assessment · Vulnerability Management

Tools & Platforms
Microsoft Defender XDR · Sentinel · Splunk · Tenable · Wireshark · Azure


📬 Contact


Open to roles in Technology Risk, GRC, IT Risk, CSIRT, and Security Governance (Tokyo / Hybrid / Remote)


🇯🇵 日本語版 README


Danです 👋

テクノロジーリスク・サイバーセキュリティアナリスト|東京

金融機関にて15年以上、信用リスク管理、内部統制、規制対応に従事。
現在はテクノロジーリスクおよびサイバーセキュリティ分野へ専門性を拡張しています。


概要

金融リスクとITガバナンスのバックグラウンドに加え、
Cyber Rangeにて実践的なSOC・インシデント対応トレーニングを実施。

技術的な調査結果を、リスク評価・統制・ガバナンス文書へと落とし込むことを強みとしています。


実務トレーニング

サイバーセキュリティアナリスト(インターン)
Cyber Range(LOG(N) Pacific)

  • SIEM(Microsoft Sentinel, Defender for Endpoint, Azure)を用いた調査
  • MITRE ATT&CKに基づく脅威ハンティング
  • インシデント対応・エスカレーション設計
  • エンドポイントログ分析(プロセス・ファイル・ネットワーク)

主なプロジェクト

🔎 脅威ハンティング(Tor Browser)

  • Tor通信の分析および挙動調査
  • タイムライン再構築およびATT&CKマッピング

🔍 SIEMログ分析レポート

  • 攻撃シナリオの分析およびインシデントレポート作成

🚨 インシデント対応プレイブック

  • SLAベースのエスカレーション設計
  • 対応フローおよび文書整備

🛡 脆弱性管理プログラム

  • リスクベースの優先順位付け
  • 是正管理および追跡プロセス設計

🛡 ISO27001 リスクレジスター

  • リスク評価および統制マッピング

スキル

セキュリティ運用
SIEM分析 · 脅威ハンティング · インシデント対応

テクノロジーリスク
ISO27001 · NIST CSF · IT統制 · リスク評価

ツール
Microsoft Defender XDR · Sentinel · Splunk · Tenable · Wireshark · Azure


テクノロジーリスク、GRC、ITリスク、CSIRT、セキュリティガバナンス関連ポジションを志向しています。

Pinned Loading

  1. Threat-Hunt-Tor-Browser-Investigation Threat-Hunt-Tor-Browser-Investigation Public

    Threat hunting investigation analyzing Tor Browser activity using Microsoft Defender (KQL) with MITRE ATT&CK mapping and incident reporting.

  2. SIEM-Incident-Analysis-Report SIEM-Incident-Analysis-Report Public

    SIEM-based incident investigation analyzing exploitation and data exfiltration scenarios with structured reporting and alert correlation.

  3. Incident-Escalation-Playbook-Report Incident-Escalation-Playbook-Report Public

    SOC incident response playbook defining escalation workflows, severity classification, and SLA-driven decision-making processes.

  4. Vulnerability-Management-Program Vulnerability-Management-Program Public

    Risk-based vulnerability management framework covering identification, prioritization, remediation tracking, and reporting workflows.

  5. Risk-Register Risk-Register Public

    ISO/IEC 27001-aligned risk register with likelihood-impact scoring and control mapping to Annex A security controls.