Cyber Intelligence Analyst

OSINT Specialist | Defensive Security Enthusiast

Identifying, analyzing, and mitigating cyber threats through comprehensive intelligence gathering and strategic security solutions.

About Me

Cyber Security Analyst

Threat Hunter

Professional Background

I'm Augustine Fosu Manu, a Security+ certified cybersecurity professional and a current active duty U.S. Army Intelligence Analyst. With a cybersecurity certificate, a BA in Economics, and an MBA, I blend analytical rigor with hands-on technical skills to secure systems and analyze threats. My journey began with mastering tools like Wireshark and Nmap, tackling projects from network audits to CTF challenges. I’m driven to protect critical information and uncover actionable intelligence. My passion lies in decoding complex threats with a strategic mindset, inspired by the covert precision of CipherPol. Explore my portfolio to see how I’m building a foundation in cybersecurity and preparing to serve with distinction.

Threat Intelligence OSINT Incident Response Malware Analysis

Projects & Case Studies

TryHackMe

IOC Enrichment and Threat Hunting using OSINT & VirusTotal

Identified suspicious indicators, performed IOC enrichment using OSINT tools like VirusTotal, and linked malicious IPs, hashes, and domains to campaigns.

Cyber Threat Intelligence
Intro to Cyber Threat Intel

Adversary Behavior Analysis using MITRE ATT&CK

Mapped adversary behavior to MITRE ATT&CK techniques, analyzed TTP categories, and assessed attack chains to improve defensive detection strategy.

Cyber Defence Frameworks
MITRE ATT&CK

Investigating Malicious Windows Activity using Sysmon & ATT&CK Mapping

Investigated malicious Windows activity using Sysmon logs, analyzed process trees, persistence techniques, and mapped attacker behavior to MITRE ATT&CK TTPs.

Endpoint Security Monitoring
Sysmon Windows Event Logs Core Windows Processes

Phishing Campaign Analysis – Extracting Malicious Infrastructure from Emails

Analyzed phishing emails, extracted sender metadata, decoded malicious payloads, and identified attacker-controlled infrastructure using header and sandbox analysis.

Phishing Analysis
Email Header Analysis Phishing Fundamentals Attachment sandbox

Network Threat Hunting: Detecting C2 Communication Patterns

Detected command-and-control traffic using Zeek and Wireshark, identified beaconing patterns, and analyzed threats through IDS alert correlation and packet inspection..

Network Security & Traffic Analysis
Zeek Brim Snort Wireshark

Incident Intelligence Report – Capstone SOC Attack Attribution

Conducted full incident investigation, extracted adversary TTPs, correlated multistage attack activity, and developed an attribution-based threat intelligence report.

SOC Level 1 Capstone
Capstone 1 Capstone 2

Certifications

GIAC Cyber Threat Intelligence (GCTI)

SANS Institute

202

GIAC Open Source Intelligence (GOSI)

Global Information Assurance Certification

Upcoming

Certified All Source Intelligence Professional (CASIP)

McAfee Institute

Upcoming

Certified in Open Source Intelligence (C/OSINT)

McAfee Institute

Upcoming

Intelligence Fundamentals Professional Certification (IFPC)

Under Secretary of Defense for Intelligence and Security (USD(I&S))

Upcoming

Certified Collection Management Professional - Fundamental (CCMP-F)

Defense Intelligence Agency PMO (DIA)

Upcoming

Security Fundamentals Professional Certification (SFPC)

Center for Development of Security Excellence (CDSE)

Upcoming

Certified Cyber Intelligence Professional (CCIP)

McAfee Institute

Upcoming

CompTIA Security+

CompTIA

2025

CompTIA CySa+

CompTIA

2025

SOC Level 1

TryHackMe

2025

Technical & Soft Skills

Technical Skills

MITRE ATT&CK

IOC Analysis

Threat Hunting

OSINT (VirusTotal, AbuseIPDB, URLScan)

Phishing Analysis

Soft Skills

Analytical Thinking

Attention to Detail

Problem Solving

Communication

Collaboration

Get In Touch

Contact Information

SECURE COMMUNICATION

PGP Key available upon request