Detecting RDP Brute-Force in Splunk
Query examples, tuning notes, and a detection rule.

Detection engineering + incident response + offensive validation. Practical labs, clean evidence, and repeatable workflows across Windows telemetry and network data.
Tools and platforms:
Penetration testing services for small to mid-sized Irish businesses, built around practical risk reduction: findings you can fix, proof you can verify.
Short reads from investigations and detections:
Query examples, tuning notes, and a detection rule.
Filters, Zeek logs, and a triage checklist.
Email: bobonikolov02@gmail.com
LinkedIn: linkedin.com/in/bobonikolov · GitHub: github.com/Nikolov999