Skip to content
View jmoreira01's full-sized avatar
  • Porto

Block or report jmoreira01

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jmoreira01/README.md

Jorge Moreira

Junior Cybersecurity Professional — Blue Team · GRC · Infrastructure Security
Porto, Portugal · Available June 2026

Portfolio LinkedIn ISC2 CC


About

Cybersecurity professional completing a Network & Cybersecurity Administration program at CESAE Digital, with internship experience at Petrotec Group in enterprise security — ISO 27001 risk assessment, PAM solution evaluation, and infrastructure documentation.

I build things to learn. My labs cover SIEM deployment, YARA-based malware detection, network intrusion detection with Suricata, and full kill-chain APT emulations mapped to MITRE ATT&CK. Background in software development (Python, C#, .NET, React) helps me understand threats at the application layer.

Currently exploring agentic AI workflows and automation — building better tools to solve security problems faster.


Security Projects

Blue Team & Detection

Project Description Key Result
siem-lab-project Wazuh SIEM with YARA malware detection, FIM and Active Response 100% detection rate · <15s response time
suricata-ids-integration Suricata NIDS integrated with Wazuh — network + host detection 3,539 alerts on NMAP scan · auto IP blocking <5s
WAZUH_YARA_Complete_Configuration Production-ready Wazuh config templates, YARA rules and troubleshooting guides 15+ custom detection rules
threat-detection-blue-team Centralized index of Blue Team projects with MITRE ATT&CK mapping 11 tactics covered

Red Team & Threat Emulation

Project Description Techniques
Offensive_Cybersecurity APT29 full kill-chain simulation + APT28 spearphishing emulation T1566 · T1071 · T1003 · T1021 · T1041 and more

Infrastructure & Networking

Project Description
Networking TCP/IP configurations, subnetting, VLSM and network infrastructure labs
google-cybersecurity-course-portfolio Security audits, NIST CSF, Linux, SQL, network analysis and incident response

MITRE ATT&CK Coverage

Techniques actively practised across lab projects:

T1566 Phishing · T1071 C2 over HTTP · T1003 Credential Dumping · T1021 Lateral Movement
T1110 Brute Force · T1190 Exploit Public App · T1204 Malicious File · T1595 Active Scanning
T1499 Endpoint DoS · T1070 Indicator Removal · T1547 Boot Persistence · T1041 Exfiltration


Technical Stack

Detection & Response    Wazuh · Suricata · YARA · ELK Stack · Active Response
Threat Intelligence     MITRE ATT&CK · Sliver C2 · Mimikatz · Metasploit · Gophish
Infrastructure          Proxmox · VMware · Linux · Windows Server · Active Directory · Docker
GRC & Compliance        ISO 27001 · Risk Assessment · GDPR · NIST
Scripting & Dev         Python · Bash · PowerShell · C# · .NET · JavaScript · Typescript · Git
Cloud                   Azure · AWS (fundamentals)

Certifications

  • ISC2 CC — Certified in Cybersecurity (in progress)
  • Google Cybersecurity Specialization — 2025
  • Google IT Support Certificate — 2023
  • Anthropic AI Fundamentals & Claude Code — 2025

All offensive security work was conducted in fully isolated lab environments. No real systems or networks were involved.

Popular repositories Loading

  1. Networking Networking Public

    Networking practical labs — TCP/IP configurations, subnetting, VLSM, and network infrastructure exercises.

    1

  2. google-cybersecurity-course-portfolio google-cybersecurity-course-portfolio Public

    Portfolio of exercises from the Google Cybersecurity Professional Certificate — security audits, NIST CSF, Linux, SQL, network analysis, and incident response.

  3. user_management user_management Public

    Python project for Cybersecurity and Networking portfolio

    Python

  4. Offensive_Cybersecurity Offensive_Cybersecurity Public

    Red team exercises and threat emulation projects — APT29 full kill-chain simulation and APT28 spearphishing emulation, mapped to MITRE ATT&CK.

  5. siem-lab-project siem-lab-project Public

    Enterprise SIEM implementation using Wazuh with FIM, YARA malware detection, and automated Active Response

  6. threat-detection-blue-team threat-detection-blue-team Public

    This repository serves as a centralized index for my Blue Team cybersecurity projects developed during the DETECT Cybersecurity Training program at CESAE Digital.