Sam Gresty
Cybersecurity Analyst
Cybersecurity β€’ Threat β€’ Operations

I'm Sam, a Cybersecurity Analyst focused on threat detection, response and cloud security.

I work across Microsoft Security and Arctic Wolf tooling to reduce potential compromise, incident response and vulnerability management. I enjoy turning noisy alerts and raw data into clear. actionable decisions.

This portfolio showcases selected projects, practical write-ups and case studies that reflect my approach to cybersecurity challenges in real environments.


Note:

This site is actively being refined as i expand my case studies and increaing my HTML knowledge.

Projects & Case Studies

KQL β€’ Defender β€’ Microsoft Excel

Vulnerability Reporting Using KQL

Produced a vulnerability report outlining weaknesses across the business.

Weaknesses Vulnerability Management Collaboration
1 Hour
Plan β€’ Document β€’ Microsoft Word

Incident Response Plan (IRP)

Documenting what would happen if we have an incident,

Weaknesses Vulnerability Management Collaboration
2 Hour
Malware β€’ IR β€’ Future Prevention

Malware Handling

I have produced a document that informs us what we need to do if we have a malware attack or attempt

Alert Reactive Write-up
3 Hours GitHub
Pen-Test β€’ IR β€’ Testing

Pen-Test Scope

Put together documentation of a scope for a 3rd party pen test to test our externally facing IPs etc

3rd Party Pen-Test vulnerabilites
1 day
Infrastructure β€’ Cloud β€’ On-Prem

Hybrid Infrastructure

Designed and documented a hybrid infrastructure layout covering on-premise servers and cloud integration.

Infrastructure Cloud Servers
6 Hours
Awareness β€’ IR β€’ SOP

Standard Operating Procedure

Was created after a false possitive that was raised, documented the findings and how to resolve quickly next time

information Knowledgebase Microsoft Word
5 Hours GitHub
Training β€’ Security β€’ Awareness

Awareness Training

Developed cybersecurity awareness material for staff, improving understanding of threats and best practice.

Training Staff Awareness Cyber Safety
5 Hours
Policy β€’ Governance β€’ Security Standards

Cybersecurity Policy

Produced a comprehensive cybersecurity policy setting out expectations, responsibilities, and minimum standards.

Governance Policy Security
5 Hours
Risk β€’ Impact β€’ CIA

Risk Appetite Statement

Created a risk appetite statement to showcase the business has 0 tollerance to risk and must be protected at all times

Governance Security Frameworks Cyber Essentials
2 Hours
Risk β€’ Governance β€’ CIA

Risk Register Template

Created a reusable template for capturing, reviewing, and managing organisational risks.

Risk Management Governance Assessment
2 Hours
Design β€’ UI β€’ Branding

Portfolio Rebuild

Rebuilt the entire portfolio with a cleaner structure, improved accessibility and brand consistency.

Design Branding Front-End
3 Months
Python β€’ Coding β€’ Security

Password Strength Script

Created a Python script that evaluates password strength and flags weak entries.

Python Security Password Testing
5 Hours

Certifications & Skills


Certification - Microsoft SC-900
Microsoft Admin Suite
Microsoft Security Suite
Cisco Umbrella
Cisco Talos
ADAudit +
Pentanar Risk Management
4Risk Management
Risk Management
Vulnerability Management
Patch Management
Nessus Scanning
AWS (Basic)
UpGuard (Basic)
Datadog (Basic)
Samsung Knox (Basic)
PowerShell
KQL
Level 1 Service Desk
Level 2 Service Desk
Outlook
Teams
CyberChef
MX tool box
Any Run
DNS Dumpster
Arctic Wolf

Contact

I'm happy to discuss collaboration, open roles, or provide feedback on security projects. If you'd like to request a redacted case study or confirm certifications, feel free to send a message or email me directly.




Email directly