Skip to content
View codewithbrandon's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report codewithbrandon

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
codewithbrandon/README.md

Brandon Harris

Cloud Security & Detection Engineer
Secure by Design Β· Detect at Runtime Β· Respond with Precision
Former U.S. Government Top Secret Cleared Professional


🧠 Professional Focus

Cloud Security Engineer specializing in secure infrastructure design, policy enforcement, and runtime threat detection within cloud-native environments.

I build platforms that:

  • Enforce Infrastructure Security (Terraform + Policy-as-Code)
  • Secure Kubernetes Workloads (AKS Hardening & Network Controls)
  • Detect Runtime Threats (Prometheus, Loki, Falco)
  • Engineer Alerts with Context (Behavioral Detection > Basic Metrics)
  • Document Incident Response Workflows

My work bridges Cloud Engineering and Detection Engineering β€” delivering full lifecycle security.


πŸš€ Flagship Projects

πŸ” Secure Cloud Platform

Zero-trust Azure infrastructure with CI/CD enforcement and security validation

Terraform β€’ AKS β€’ Jenkins β€’ OPA β€’ Microsoft Sentinel
https://github.com/codewithbrandon/secure-cloud-platform


πŸ›‘οΈ Cloud Threat Detection Platform

Runtime anomaly detection & incident simulation for Kubernetes workloads

Prometheus β€’ Alertmanager β€’ Loki β€’ Falco β€’ Incident Playbooks
https://github.com/codewithbrandon/cloud-threat-detection


🧰 Secure Vault

Security-first web application demonstrating hardened authentication and secure design patterns
https://github.com/codewithbrandon/secure-vault


πŸ”Ž Vulnerability Scanner

Security automation tool for repeatable scanning & reporting workflows
https://github.com/codewithbrandon/vuln-scanner


πŸ•΅οΈ Honeypot Lab

Adversary telemetry collection and behavior analysis platform
https://github.com/codewithbrandon/honeypot


βœ‰οΈ Phishing Incident Analysis

SOC-style email investigation with IOC extraction and mitigation strategy
https://github.com/codewithbrandon/Phishing-Incident-Analysis


πŸ“œ Certifications

CompTIA Security+
Google Cybersecurity Professional
LetsDefend SOC Analyst Path
Qualys VMDR
Microsoft Azure Security Engineer (In Progress)


πŸ“ˆ Currently Advancing

  • Detection Engineering & Alert Tuning
  • Azure Cloud Governance & Drift Detection
  • Linux Hardening & Automation
  • Infrastructure Security Validation
  • Security Automation with Python

🀝 Connect

Pinned Loading

  1. cloud-threat-detection cloud-threat-detection Public

    Production-grade Kubernetes runtime security platform β€” Prometheus + Falco + Loki + Alertmanager | 12 alert rules | 9 Falco eBPF rules | MITRE ATT&CK coverage across 11 tactics

    Python

  2. secure-cloud-platform secure-cloud-platform Public

    Enterprise Azure Infrastructure with Zero Trust Security

    HCL

  3. honeypot honeypot Public

    The Cloud-Native Threat Detection Lab project aimed to establish a high-interaction, open-source Honeypot environment to passively collect and analyze real-world threat intelligence. The primary go…

  4. Phishing-Incident-Analysis Phishing-Incident-Analysis Public

    This project demonstrates core skills in the "Analyze" stage of the Security Operations Center (SOC) workflow. The objective was to methodically triage a suspicious email, reverse-engineer its orig…

  5. secure-vault secure-vault Public

    JavaScript

  6. azure-security-baseline azure-security-baseline Public

    Terraform-provisioned Azure environment that audits itself β€” NSG analysis, Defender for Cloud, Entra ID logging, and automated findings reporting

    Python