// uid0xa1.burst@detect // roledetection engineer · threat hunter // locremote · UTC−5

ALEX
BURST_

I build detections that actually fire on real attackers — and stay quiet on everything else. Sigma, SPL, KQL, YARA-L. I instrument the gaps your EDR can’t see and write the runbooks for what comes next.

180+rules shipped
0.4%median FP rate
11+yblue team
24/7uptime worn
~ / alex.burst — zsh — 80×24
tty.001
01_

about()

who am I, what I do, and how I think about defending things

I’m a detection engineer who treats SOC tooling as a product and adversary behavior as a backlog. Every rule I ship is paired with a test, a runbook, and an exit criterion — because untested detections are just expensive alerts.

Most of my work lives at the seam between threat intel, data engineering, and incident response. I’ve stood up greenfield detection pipelines, retired noisy rule packs that nobody had the political will to kill, and chased APTs across three continents’ worth of cloud logs.

Outside of work I write a quiet newsletter on detection-as-code, maintain a few open-source Sigma packs, and lose at CTFs with enthusiasm.

currentlyStaff Cybersecurity Engineer - SIEM, The Home Depot
focuscloud TTPs · identity abuse · supply-chain
open to consulting advisory workshops
not interested invendor demos with no API
02_

detections.rules

identity-focused detections across Microsoft Entra & Google Cloud. hover any card to expand the source.
high Entra — Illicit Consent to Unverified Publisher DR-2025-061

Catches OAuth phishing where a user consents to a multi-tenant app from an unverified publisher with delegated Mail.Read / offline_access scopes. Joins Entra AuditLogs with the ServicePrincipal directory to suppress vetted apps.

title: Entra Illicit Consent — Unverified Publisher
logsource:
  product: entra
  service: auditlogs
detection:
  selection:
    OperationName: 'Consent to application'
    Result:        'success'
    TargetResources.modifiedProperties.displayName|contains:
      - 'Mail.Read'
      - 'offline_access'
      - 'User.Read.All'
    AppPublisher.verifiedPublisher: null
  filter_known:
    AppId|in: %vetted_apps%
  condition: selection and not filter_known
level: high
tags: [ attack.t1528, attack.persistence ]
#entra#oauth#consent-phish
read writeup →
high GCP — Service Account Key Issued for Privileged SA DR-2025-054

Long-tail GCP persistence: a user-managed JSON key is created on a service account that holds Owner / Editor / SecurityAdmin elsewhere in the org, outside an approved Terraform pipeline.

title: GCP — Service Account Key Issued for Privileged SA
id: dr-2025-054
status: stable
logsource:
  product: gcp
  service: gcp.audit
detection:
  selection:
    data.protoPayload.methodName: 'google.iam.admin.v1.CreateServiceAccountKey'
    data.protoPayload.resourceName|endswith: '@privileged.iam.gserviceaccount.com'
  filter_iac_principal:
    data.protoPayload.authenticationInfo.principalEmail|endswith: '@iac.gserviceaccount.com'
  filter_ci_egress:
    data.protoPayload.requestMetadata.callerIp|cidr:
      - '10.50.0.0/16'
  condition: selection and not (filter_iac_principal or filter_ci_egress)
fields: [ principalEmail, resourceName, callerIp ]
level: high
tags: [ attack.persistence, attack.t1098 ]
#gcp#iam#persistence
read writeup →
high Entra — MFA Fatigue → Successful Sign-in DR-2025-049

Detects ≥ 4 denied MFA prompts on a single user within 10 minutes followed by an accepted prompt — the classic push-bombing TTP. Enriches with sign-in risk + impossible-travel flags.

title: Entra — MFA Fatigue Followed by Successful Sign-in
id: dr-2025-049
status: experimental
logsource:
  product: entra
  service: signinlogs
detection:
  denied:
    ResultType:
      - '50074'   # MFA challenge not passed
      - '50076'   # MFA required, denied
      - '50158'   # external security challenge failed
  success:
    ResultType: '0'
    AuthenticationDetails|contains: 'MFA succeeded'
  timeframe: 10m
  condition: denied | count() by UserPrincipalName > 3 and success
fields: [ UserPrincipalName, IPAddress, RiskLevelAggregated ]
level: high
tags: [ attack.credential_access, attack.t1621 ]
#entra#mfa-fatigue#sigma
read writeup →
med GCP — Workload Identity Federation Token Exchange Anomaly DR-2025-037

Flags sts.googleapis.com token exchanges where the external subject does not match an approved CI provider / repo binding — i.e. someone abusing a misconfigured WIF pool to mint access tokens for a GCP service account.

title: GCP — WIF Token Exchange with Unexpected External Subject
id: dr-2025-037
status: experimental
logsource:
  product: gcp
  service: gcp.audit
detection:
  selection:
    data.protoPayload.serviceName: 'sts.googleapis.com'
    data.protoPayload.methodName: 'GenerateAccessToken'
  filter_allowed_pool:
    data.protoPayload.request.audience|contains:
      '/workloadIdentityPools/github-oidc/'
    data.protoPayload.request.subjectTokenClaims.sub|startswith:
      - 'repo:alex-burst/'
  condition: selection and not filter_allowed_pool
fields: [ principalEmail, audience, subjectTokenClaims.sub, callerIp ]
level: medium
tags: [ attack.persistence, attack.t1078.004 ]
#gcp#wif#sigma
read writeup →
03_

projects[]

things I’ve built, broken, and put back together — open-source & private
04_

experience&&certs

where I’ve worked, what I shipped, what I’m credentialed for
Staff Cybersecurity Engineer — SIEM
The Home Depot · full-time
11.2022 ─ now
  • Architecting log source integrations and mentoring senior engineers on detection rule development and strategies.
  • Led enterprise SIEM migration from Sumo Logic to Palo Alto XSIAM; reduced false positives by 40%.
  • Deployed AI-powered toolkit using Google Gemini to automate Sigma rule generation and reduce alert fatigue.
Cybersecurity Engineer
US Army · full-time
10.2021 ─ 11.2022
  • Supported DoD cyber operations and infrastructure at Fort Meade, MD.
  • Executed offensive and defensive cyberspace operations enabling OCO/DCO mission objectives.
Security Engineer / Splunk Developer
Peraton (DHS) · contract
12.2018 ─ 11.2022
  • Managed multiple high-ingest Splunk environments across DHS programs.
  • Engineered log onboarding solutions meeting NIST 800-53 controls.
  • Architected 200TB multi-tier PCAP storage solution for cyber operations.
Cyber Operations Specialist
US Army National Guard · part-time
2013 ─ present
  • Executing offensive and defensive cyberspace operations supporting military objectives.
  • Designed and implemented the LAANG CPT Sandbox platform for defensive and offensive cyber operations.

// certifications 27+ · auto-scroll

05_

skills.live

the stack I reach for, plus a sample of what daylight in my SIEM looks like

// detection & siem 19

SigmaSplunk SPLKQL YARA-LXSIAMSumo Logic SentinelElasticChronicle QRadarPantherOpenSearch CriblFalconSentinelOne Carbon BlackDefender XDROSquery Snorkel

// code & pipeline 12

PythonGoBash AnsibleTerraformGitHub Actions DockerKafkaPostgres DuckDBdbtSQL

// adversary & intel 8

MITRE ATT&CKD3FENDSTIX/TAXII MISPOpenCTICaldera Atomic Red TeamStratus
live.siem — tail -f /var/log/alerts
0 evt/s
graph.kill_chain — interactive
nodes: 0
host sensor attacker payload