███╗░░░███╗░█████╗░░██████╗░█████╗░███╗░░██╗  ░█████╗░███╗░░██╗██████╗░███████╗██████╗░░██████╗░█████╗░███╗░░██╗
████╗░████║██╔══██╗██╔════╝██╔══██╗████╗░██║  ██╔══██╗████╗░██║██╔══██╗██╔════╝██╔══██╗██╔════╝██╔══██╗████╗░██║
██╔████╔██║███████║╚█████╗░██║░░██║██╔██╗██║  ███████║██╔██╗██║██║░░██║█████╗░░██████╔╝╚█████╗░██║░░██║██╔██╗██║
██║╚██╔╝██║██╔══██║░╚═══██╗██║░░██║██║╚████║  ██╔══██║██║╚████║██║░░██║██╔══╝░░██╔══██╗░╚═══██╗██║░░██║██║╚████║
██║░╚═╝░██║██║░░██║██████╔╝╚█████╔╝██║░╚███║  ██║░░██║██║░╚███║██████╔╝███████╗██║░░██║██████╔╝╚█████╔╝██║░╚███║
╚═╝░░░░░╚═╝╚═╝░░╚═╝╚═════╝░░╚════╝░╚═╝░░╚══╝  ╚═╝░░╚═╝╚═╝░░╚══╝╚═════╝░╚══════╝╚═╝░░╚═╝╚═════╝░░╚════╝░╚═╝░░╚══╝
            

B.S. Cybersecurity student_

Try “help”, “nav news”, or “pong”
host: portfolio | latency: -- ms | link: up
[user@portfolio ~]$

> About Me

I’m Mason Anderson, working toward my B.S. in Cybersecurity with a focus on detection engineering, incident response, and resilient architecture. I instrument and harden systems so they stay observable, defensible, and ready for the next wave.

Years Learning
3
Homelab Uptime
99.9%
CTF Placement
Top 5%
Writeups Published
12

> Skillset

Offense, defense, and automation to keep the signal loud and the noise low.

Offensive

Recon to exploit to PoC.

  • Web & API testing (Burp, ffuf)
  • Exploit dev basics (BoF, payload crafting)
  • Red teaming labs & CTFs

Defensive

Detection engineering & blue ops.

  • SIEM tuning & log pipelines (Splunk/ELK)
  • Detection content (Sigma/YARA)
  • IR playbooks and triage

Ops & Automation

Keep it reproducible and fast.

  • Python/Bash tooling & log parsers
  • Cloud hardening & IaC basics
  • Dashboards & alert quality reviews

Playbooks

Incident Response (NIST)
Prep Runbooks, contacts, lab images
Detect Sigma, Suricata, Zeek slices
Contain Segmentation, EDR isolate
Eradicate Artifact cleanup, patch
Recover Clean images, validate logs
Lessons PIR, detections + metrics
Threat Hunting
Hypothesis Based on intel & anomalies
Hunt Log pivots, PCAP slices, regex
Validate Reduce FPs, artifact review
Detect Turn findings into rules

> Case Files

Selected work with evidence, metrics, and tooling.

Case Alpha: Secure Web App
Blue
  • Recon Enumerated endpoints, threat modeled auth flows
  • Exploit Built PoCs for XSS & CSRF; tuned WAF rules
  • Mitigation Added MFA, CSP, parameterized queries
  • Evidence Reduced vuln surface; 0 criticals in retest
False Positives -35%
Auth Bypass 0 in retest
Case Beta: Malware Analysis
Red
  • Recon Static triage, strings, import graph
  • Exploit Observed C2 in sandbox; captured traffic
  • Mitigation Network blocks, AV signatures, hardening
  • Evidence YARA + IOC pack shipped to blue team
Detection Time -28%
Coverage +4 new rules
Case Gamma: SIEM Detections
Blue
  • Recon Mapped log sources, coverage gaps
  • Exploit Adversary emulation to validate detections
  • Mitigation Auth anomaly rules + pipeline fixes
  • Evidence Shipped dashboards + alert QA doc
MTTD -22%
FP Rate -18%

> Security Wire

Live headlines from trusted infosec feeds.

Updated just now

    > Contact

    Open to security internships and collaboration.

    Found a vulnerability or want to talk security? Reach out via your preferred channel.

    View Resume SHA-256: b6c1e9b0...7f3a
    PGP
    -----BEGIN PGP PUBLIC KEY BLOCK----- ... -----END PGP PUBLIC KEY BLOCK-----
    Response time: < 24 hours