Yusuf Talha
ARABACI
Cyber Security Engineer | Digital Sovereignty• Cloud-Native Security • Open Source • Data Privacy • Next-Gen SOC • Endpoint Protection • Network Defense
Cyber Security Engineer combining offensive foundations and enterprise SOC experience with digital sovereignty and cloud-native security strategies. Focused on replacing traditional dependencies with open-source, secure, and autonomous infrastructures
About Me
I am a Cyber Security Engineer operating on the principle: "To learn defense, one must master offense." I bridge low-level system understanding with enterprise-scale defense architectures.
The Architectural Frontier
Security starts at the hardware level. By mastering Assembly and C, I use granular system knowledge to design Security Observability strategies that turn hardware limits into defensive advantages.
From Offensive Roots to Enterprise Defense
starting in Red Team operations, I scaled this adversarial mindset into defensive engineering:
- Incident Response: Neutralizing complex threats in financial sectors.
- Threat Hunting: Converting intelligence into proactive defense.
- Hardening: Optimizing resilience and system integrity.
Engineering Digital Sovereignty
My focus is The Ubuntu Sovereign Stack—architecting an open-source enterprise alternative for total data autonomy, integrating:
- Automated Orchestration: Self-healing environments.
- Unified IAM: Secure, open-source directory services.
- Full-Stack Observability: Deep visibility via SIEM.
Goal
Building a resilient and sovereign digital infrastructure designed to eliminate vendor lock-in, prioritizing supply chain security and automated compliance through an integrated open-source ecosystem.
Career Objective
Relocating to Tallinn, Estonia (Q1 2026) to contribute to Europe’s most advanced digital society.
Quick Stats
- Experience 3+ Years
- Focus Blue Team / SOC
- Location Turkey
- Status Available
Where I've Worked
Cyber Security Engineer @ Arma Bilisim
- Strengthened enterprise security using SIEM, XDR, EPP, and DLP.
- Led threat hunting with open-source tools.
- Supported incident response through automation, log analysis, and forensics.
SOC Analyst @ Garanti BBVA Technology
- Monitored and analyzed security events via SIEM and XDR platforms.
- Conducted threat detection and response across endpoints and networks.
- Collaborated on forensic investigations and reporting.
MDR Analyst @ ADEO Cyber Security
- Managed network security using Wazuh, Sentinel, and Defender XDR.
- Implemented DLP and EDR solutions to prevent data breaches.
- Performed log analysis and vulnerability assessments.
Intern IT Services & Security @ Consulta
- Assisted in IT infrastructure and system security operations.
- Supported Linux hardening and Exchange server tasks.
- Contributed to security awareness and documentation.
Technical Arsenal
Featured Projects
NPM Supply Chain Analysis
Analyzing the dependency network of NPM packages to identify critical nodes and supply chain risks using Centrality metrics.
ApiGoat
A deliberately vulnerable REST API designed to teach developers and security testers about the OWASP Top 10 API Security risks.
MCP Agentic Security
Comprehensive research and security review of the Model Context Protocol (MCP), focusing on agent interoperability risks.
WebVuln Runner
Docker-based TUI application to easily deploy hazardous web environments (Juice Shop, DVWA, etc.) for penetration testing practice.
Spam Mail Detection
Machine Learning model trained to detect Turkish spam emails with high accuracy using NLP preprocessing and KNN classification.
ANKA UAV Software
Autonomous flight control software developed for the ANKA team in Teknofest 2022 International UAV Competition.
Fullstack E-Commerce
Complete e-commerce platform with modern frontend and robust backend architecture, featuring payment integration and inventory management.
Elastic SecOps Mastery
Hands-on Elastic SecOps project featuring SIEM detections, dashboards, ingest pipelines, and SOC workflows built on Elastic Stack.
Latest Articles
Analysis of Software Supply Chain Security and the npm Ecosystem
Analyzing the Shai-Hulud worm, structural npm vulnerabilities, and the move towards Zero-Trust Execution for software supply chain security.
Under the Hood: Deep Dive into SentinelOne Singularity
A technical deep dive into Autonomous SOC, Purple AI, kernel-level EDR architecture, and XDR capabilities.
Microsoft’s Cloud-First Strategy and Data Privacy
The State of On-Prem Products, Identity Management, and Data Sovereignty concerns in Microsoft's ecosystem.
The Agentic Frontier: The Rise of Autonomous AI
Exploring the shift from RAG to Autonomous Agentic AI, the architecture of autonomy, and the critical security threats facing these systems.
Silicon Logic: From Metal to Mastermind
A comprehensive guide to x86 Architecture, Assembly, C Programming, and OS Internals.
Technical Writeups & Research
A comprehensive collection of threat hunting guides, red team operational drills, and security research (CTI, Deception, DNS, EDR).