
Securing the Digital Frontier with Intelligence-Driven Defense
Welcome to my cybersecurity portfolio. I’m Cassidy Veney, a Cybersecurity Intelligence Management student at Morgan State University based in Baltimore, MD. Explore my Blue Team projects, certifications, and skills as I develop expertise in threat detection, incident response, and cloud security.
About Me
I’m Cassidy Veney, a Cybersecurity Intelligence Management student at Morgan State University (4.0 GPA) specializing in Blue Team operations, threat detection, and incident response.
I hold cybersecurity certifications from Google, Microsoft, and Palo Alto Networks, giving me practical experience with SIEM tools, cloud security fundamentals, and defensive analysis.
I’m developing hands-on experience through security lab projects that simulate real-world SOC work. My goal is to protect people, communities, and businesses by strengthening their digital defenses and creating safe environments online.
Core Skills & Focus Areas
- SIEM analysis — SIEM triage, alert investigation, and log analysis
- Threat detection — identifying suspicious activity in Windows Event Viewer
- Phishing investigations — email header analysis, URL reputation, and user guidance
- Cloud security — IAM, monitoring, and misconfiguration detection
- Communication — clear incident documentation and reporting
Featured Cybersecurity Projects
Below are selected cybersecurity projects showcasing my skills in threat analysis, detection engineering, and Blue Team operations.
Windows Event Log Deep Dive
Analyzed Security, System, and PowerShell logs to detect suspicious activity, brute-force patterns, and abnormal commands.
Outcome: Identified indicators of compromise and produced an incident-ready report for SOC escalation.
SIEM Log Triage Project
Triaged alerts in a simulated SOC environment, enriched events with IP data, and correlated logs to identify true positives vs. false positives.
Outcome: Escalated real threats and documented SOC-style findings.
Phishing Email Investigation
Analyzed email headers, sender identity, and URLs using sandbox tools.
Outcome: Identified a credential-harvesting domain and extracted IOCs for blocking.
Lazarus Group Threat Intelligence Report
Researched the Lazarus APT group, analyzed TTPs, and mapped behaviors to MITRE ATT&CK.
Outcome: Produced a structured intel report for alert tuning and detection engineering.