Han Yeti Logo Image
Han Yeti

Hey, My name is Han Yeti

I believe that in the realm where information is power, the ability to protect it defines true strength and impact.

About Me I am a certified cybersecurity specialist with a background in Computer Engineering. I am committed to safeguarding digital environments through robust security operations and proactive threat management. I combine my technical expertise with a passion for continuous learning to effectively mitigate the evolving challenges of cybersecurity.

Get to know me!

Hey! It's  Han Yeti  and I'm living in Sydney. Cybersecurity has been a core interest since my early years, naturally leading me to a career dedicated to safeguarding digital environments. As a Computer Engineering graduate from Kocaeli University, I built a solid understanding of how technology works. I love to learn by doing . I constantly build my own virtual labs and use advanced online platforms to challenge and train myself , always pushing to develop new skills and explore complex scenarios. These hands-on experiences have helped me learn about log analysis, finding weaknesses, and handling security incidents.

My passion for cybersecurity is continuously fueled by the numerous virtual labs I've built and the countless online challenges I've tackled, constantly applying and refining my skills. Feel free to contact me here to discuss security insights or potential collaborations.

Contact

My Skills

SIEM
IDS/IPS
SOC
SOAR
EDR/XDR
Incident Response
Log Analysis
Threat Hunting
Security Monitoring
Cyber Threat Intelligence
Malware Analysis
Network Security

Projects Here you'll find a selected collection of my projects demonstrating the application of technical skills and practical expertise in cybersecurity, from theoretical concepts to real-world implementations.

Software Screenshot

Active Directory Threat Simulation and SIEM Analysis

In this project, a comprehensive virtual lab environment was built and operated to simulate Active Directory (AD) threats and analyze their impact using a Security Information and Event Management (SIEM) system.

Case Study
Software Screenshot

Automated SOC with SOAR Implementation

In this project, I set up and deployed a fully automated Security Operations Center (SOC) within a virtual lab environment. The main challenge I tackled was the inherent inefficiency of manual incident detection and response.

Case Study
Software Screenshot

Phishing Unfolding

This project is all about walking through a real-world phishing incident from start to finish. I'll be detailing my entire investigation process, from the moment a suspicious email alert popped up in our SIEM, right through to tracking the attacker's every move in Splunk. My goal here is to lay out how I approached this, what evidence I found, and how I pieced together the full attack chain to formulate a concrete remediation plan.

Case Study
Software Screenshot

Continuous Cybersecurity Training

This project collection showcases the development and validation of cybersecurity skills through structured training platforms, live lab environments, and threat detection simulations. It emphasizes practical experience in security operations, vulnerability assessment, and digital forensics.

Case Studies

Contact Have a question, an opportunity, or just want to say hello? I'd love to hear from you. Please fill out the form below.