Skip Navigation
Get a Demo
 
Detection Engineering Lead

Keshia LeVan

Keshia likes building tools with Ruby and Python, is mocked for her Splunk obsession, and spends too much time playing with logs and json to develop security content (or at least pretty graphs). She's worked in several SOCs, triaging alerts and analyzing EDR data before focusing more on security engineering.
Driving Efficacy Through Detector Tuning: a Deeper Dive Into Detection Engineering
Driving Efficacy Through Detector Tuning: a Deeper Dive Into Detection Engineering
Using Alternate Data Streams to Bypass User Account Controls
Using Alternate Data Streams to Bypass User Account Controls
Alert Fatigue: How to Tune Out the Noise and Reclaim Your Hours
Alert Fatigue: How to Tune Out the Noise and Reclaim Your Hours
Old Phishing Attacks Deploy a New Methodology: Verclsid.exe
Old Phishing Attacks Deploy a New Methodology: Verclsid.exe
Whitelist Evasion Example: Threat Detection #723
Whitelist Evasion Example: Threat Detection #723
Bypassing Application Whitelisting: How IT Teams Can Detect It
Bypassing Application Whitelisting: How IT Teams Can Detect It

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top