Skip to content
View gustavo89587's full-sized avatar
  • Okamoto Security Labs

Block or report gustavo89587

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
gustavo89587/README.md

πŸ‘¨β€πŸ’» Gustavo β€” Detection Engineering | Blue Team | Windows Telemetry

Sigma Sysmon Wazuh Elastic OpenTelemetry MITRE

Detection Engineer focused on high-fidelity detections built from real Windows telemetry and grounded in attacker behavior, not keyword-based alerts.

I work across Windows internals, Sysmon, Sigma, and SIEM pipelines, with an emphasis on:

  • Signal quality over alert volume
  • Correct parsing and normalization
  • False-positive reduction through context

I’m also the author of the Detection Fidelity Score (DFS) and a contributor to OpenTelemetry Collector, working on telemetry pipelines that make reliable security analytics possible at scale.


πŸ” What I work on

  • Windows telemetry (Sysmon, native Event Logs)
  • Detection engineering & adversary tradecraft modeling
  • Sigma rule design and refinement
  • SIEM parsing and normalization (Wazuh, Elastic)
  • Telemetry pipelines (OpenTelemetry Collector)
  • Alert fidelity, tuning, and signal-to-noise optimization

🧠 Projects

🧠 Detection Fidelity Score (DFS) β€” Author

Creator and maintainer of Detection Fidelity Score (DFS) β€” a practical framework to evaluate the quality of detection rules, not just their coverage.

DFS scores detections based on:

  • Behavioral accuracy
  • Telemetry reliability
  • Context richness
  • Expected false-positive rate
  • Operational impact on SOC workflows

The goal is to move detection engineering away from β€œdoes it detect?” toward
β€œis this detection worth an analyst’s time?”

Repository: https://github.com/gustavo89587/detection-fidelity-score


πŸš€ Open-source contributions

I contribute to security tooling used by blue teams and SOCs in production.

πŸ›‘ SigmaHQ

  • Improving Windows-focused detections based on real attacker tradecraft
  • Context-aware detection logic (execution paths, parent-child relationships)
  • Reducing administrative and tooling noise without losing coverage

Examples include:

  • Detection of password-protected archive creation (MITRE ATT&CK T1560.001)
  • Refinements to avoid common false positives in enterprise environments

🧩 Wazuh

  • Improving Windows and Sysmon decoding reliability
  • Fixing malformed or ambiguous decoders
  • Enhancing Sysmon Event ID 1 (Process Create) parsing
  • Normalizing telemetry to make downstream detection viable

πŸ“‘ OpenTelemetry Collector

  • Contributions focused on telemetry collection and processing pipelines
  • Improving the reliability and structure of data consumed by security analytics
  • Bridging observability practices with detection engineering requirements

All contributions are public and visible in my GitHub activity.


🧠 Detection philosophy

Good detection is not about more alerts.
It’s about deciding which events deserve human attention.

I design detections around:

  • Adversary intent, not tool names
  • Behavioral context instead of single events
  • Telemetry trustworthiness
  • Sustainable SOC operations

If a detection cannot survive contact with a real SOC, it is not finished.


πŸ“« Contact


πŸ“Œ Why this matters

I don’t just study security concepts β€”
I help improve the detections and telemetry pipelines that SOC teams actually rely on.

Pinned Loading

  1. soc-incident-response-playbooks soc-incident-response-playbooks Public

  2. cloud-security-labs-aws cloud-security-labs-aws Public

    Python 1

  3. blue-team-detection-labs blue-team-detection-labs Public

  4. soc-threat-intel-automation soc-threat-intel-automation Public

    Python

  5. OKAMOTO-SECURITY-LABS-INCIDENT-RESPONSE-REPORT OKAMOTO-SECURITY-LABS-INCIDENT-RESPONSE-REPORT Public