Sam Gresty
Cybersecurity Analyst
Cybersecurity • Threat • Operations

Welcome, I'm Sam, a Cybersecurity Analyst building my online portfolio.

I specialise in identifying, monitoring, and responding to cyber threats, investigating security incidents, and managing vulnerabilities through effective patching - all to help protect systems and keep data secure.

Here, you will find a selection of projects, write-ups, and hand-picked resources that provide insight into my approach to cybersecurity and how I work day to day


Please note:

This site is a work in progress as I continue rebranding and updating it in my spare time. Thank you for your patience.

Projects & Case Studies

KQL • Defender • Microsoft Excel

Vulnerability Reporting Using KQL

Produced a vulnerability report outlining weaknesses across the business.

Weaknesses Vulnerability Management Collaboration
1 Hour
Plan • Document • Microsoft Word

Incident Response Plan (IRP)

Documenting what would happen if we have an incident,

Weaknesses Vulnerability Management Collaboration
2 Hour
Malware • IR • Future Prevention

Malware Handling

I have produced a document that informs us what we need to do if we have a malware attack or attempt

Alert Reactive Write-up
3 Hours GitHub
Pen-Test • IR • Testing

Pen-Test Scope

Put together documentation of a scope for a 3rd party pen test to test our externally facing IPs etc

3rd Party Pen-Test vulnerabilites
1 day
Infrastructure • Cloud • On-Prem

Hybrid Infrastructure

Designed and documented a hybrid infrastructure layout covering on-premise servers and cloud integration.

Infrastructure Cloud Servers
6 Hours
Awareness • IR • SOP

Standard Operating Procedure

Was created after a false possitive that was raised, documented the findings and how to resolve quickly next time

information Knowledgebase Microsoft Word
5 Hours GitHub
Training • Security • Awareness

Awareness Training

Developed cybersecurity awareness material for staff, improving understanding of threats and best practice.

Training Staff Awareness Cyber Safety
5 Hours
Policy • Governance • Security Standards

Cybersecurity Policy

Produced a comprehensive cybersecurity policy setting out expectations, responsibilities, and minimum standards.

Governance Policy Security
5 Hours
Risk • Impact • CIA

Risk Appetite Statement

Created a risk appetite statement to showcase the business has 0 tollerance to risk and must be protected at all times

Governance Security Frameworks Cyber Essentials
2 Hours
Risk • Governance • CIA

Risk Register Template

Created a reusable template for capturing, reviewing, and managing organisational risks.

Risk Management Governance Assessment
2 Hours
Design • UI • Branding

Portfolio Rebuild

Rebuilt the entire portfolio with a cleaner structure, improved accessibility and brand consistency.

Design Branding Front-End
3 Months
Python • Coding • Security

Password Strength Script

Created a Python script that evaluates password strength and flags weak entries.

Python Security Password Testing
5 Hours

Certifications & Skills


Certification - Microsoft SC-900
Microsoft Admin Suite
Microsoft Security Suite
Cisco Umbrella
Cisco Talos
ADAudit +
Pentanar Risk Management
4Risk Management
Risk Management
Vulnerability Management
Patch Management
Nessus Scanning
AWS (Basic)
UpGuard (Basic)
Datadog (Basic)
Samsung Knox (Basic)
PowerShell
KQL
Level 1 Service Desk
Level 2 Service Desk
Outlook
Teams
CyberChef
MX tool box
Any Run
DNS Dumpster
Arctic Wolf

Contact

I'm happy to discuss collaboration, open roles, or provide feedback on security projects. If you'd like to request a redacted case study or confirm certifications, feel free to send a message or email me directly.




Email directly