Skip to content
Charles Asirifi
Charles Asirifi
  • Home
  • Portfolio
  • Contact
Charles Asirifi
Charles Asirifi
  • Home
  • Portfolio
  • Contact

Amadey – APT-C-36 Memory Dump Analysis

Leave a Comment / Cybersecurity, Digital Forensics / charles

Scenario An after-hours alert from the Endpoint Detection and Response (EDR) system flags suspicious activity on a Windows workstation. The […]

Amadey – APT-C-36 Memory Dump Analysis Read More »

poisoned_credentials_banner

Poisoned Credentials Lab

Leave a Comment / Cybersecurity, cybersecurity labs, Network Analysis, Threat Intelligence / charles

Introduction In this lab, we delve into a simulated network security incident involving poisoned credentials, where attackers exploit vulnerabilities in Link-Local

Poisoned Credentials Lab Read More »

EKS terraform automation project

AWS EKS Infrastructure Automation with Terraform & Jenkins

Leave a Comment / Uncategorized / charles

AWS EKS Infrastructure Automation with Terraform & Jenkins Read More »

Kubernetes Migration Project: From docker-compose to High Availability

Kubernetes Migration Project: From docker-compose to High Availability

Leave a Comment / Cloud, DevSecOps / charles

From Manual Chaos to Automated Orchestration 🚀

Kubernetes Migration Project: From docker-compose to High Availability Read More »

Complete **CI/CD pipeline** that runs on every push → tests → builds → publishes Docker image → updates git with version changes.

Automated CI Pipeline for Node.js App Using Jenkins & Docker

Leave a Comment / Cloud, DevSecOps / charles

Complete CI/CD pipeline that runs on every push → tests → builds → publishes Docker image → updates git with

Automated CI Pipeline for Node.js App Using Jenkins & Docker Read More »

Docker Compose: Java App + MySQL Deployment

Leave a Comment / DevSecOps / charles

Docker Compose: Java App + MySQL Deployment Read More »

1 2 … 5 Next →

Based in Canada - Working World Wide | Copyright © 2026 Charles Asirifi | DevOps