Skip to content
View lopes's full-sized avatar
🪖
shipping detection-as-code and generating deception artifacts
🪖
shipping detection-as-code and generating deception artifacts

Block or report lopes

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
lopes/README.md

Joe Lopes

Typing SVG

I deploy SIEMs, write detection rules, design SOAR playbooks, and set honeypot traps. Turning logs into signal across fintech and critical infrastructure.

LinkedIn Blog CISSP


cat /etc/lopes/skills.conf

[siem]
platforms       = chronicle, qradar, splunk
architecture    = multi-tenant log pipelines, built to not fall over
log_engineering = ingestion design, parsing, cost optimization (99.9% cloudtrail reduction)
correlation     = misp → siem (real-time ioc matching)

[detection]
languages       = yara-l, sigma, spl
approach        = detection-as-code (yaml → siem + edr)
tuning          = data-driven false positive reduction

[soar]
platform        = chronicle soar
scope           = playbook design, enrichment workflows, automated containment
philosophy      = if you are doing it twice, it should be a playbook

[adversary_engagement]
honeypots       = thinkst canary, cowrie, custom deployments
honeytokens     = credential canaries, aws keys, dns tokens, breadcrumbs
program         = led company-wide adversary engagement program
philosophy      = let them in. on your terms.

[incident_response]
biggest_day     = ransomware on 3000+ endpoints → root cause in 72h
automation      = python tooling for triage, enrichment, containment
csirt           = built one from scratch → listed by cert.br

[infrastructure]
cloud           = aws, gcp
os              = linux (since 2005)
init            = systemd (service hardening, journald)
firewall        = nftables
config_mgmt     = ansible
containers      = podman
tools           = nmap, git, netbox, terraform

[programming]
primary         = python
systems         = rust
glue            = bash, sql

dpkg -l | grep installed

Python Rust Bash SQL Chronicle SIEM Chronicle SOAR QRadar Splunk YARA-L Sigma MISP Thinkst Canary Cowrie AWS GCP Linux macOS Ansible Podman Git systemd nftables Nmap MITRE ATT&CK


grep -c "lopes" /var/log/conferences/*

ibm_security_summit.log:1      # panelist — threat detection & IR
certbr_csirt_forum.log:3       # 2014, 2018, 2019 — csirt, siem, netsec
brazilian_army_hq.log:1        # scada systems security
itaipu_colloquium.log:1        # soc practices for ot/ics

watch -n1 cat /proc/lopes/status

Stats

Pinned Loading

  1. cordyceps cordyceps Public

    Learn ransomware mechanics ⚙︎

    Rust 13 1

  2. netbox-scanner netbox-scanner Public

    A scanner util for NetBox

    Python 200 44

  3. Simple Python example of AES in CBC ... Simple Python example of AES in CBC mode. #python #cryptography #aes #cbc #poc
    1
    #!/usr/bin/env python3
    2
    #
    3
    # This is a simple script to encrypt a message using AES
    4
    # with CBC mode in Python 3.
    5
    # Before running it, you must install pycryptodome:
  4. lopes-logbook lopes-logbook Public

    where others see logs, I see stories

    SCSS