Skip to content
View rashidaalexander's full-sized avatar
πŸ’­
I do both Red and Blue Teams, which positions me as a Purple Team professional.
πŸ’­
I do both Red and Blue Teams, which positions me as a Purple Team professional.

Block or report rashidaalexander

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
rashidaalexander/README.md

Hi πŸ‘‹πŸ½, I'm Rashida

Purple Team β€’ Security Research β€’ AppSec β€’ Cloud Security


πŸ“ What I do

  • πŸ΄β€β˜ οΈ Purple Team: validate detections and response through threat-led, evidence-based testing
  • πŸ΄β€β˜ οΈ Application Security: authentication & authorization flaws, multi-tenant SaaS risk, secure design reviews
  • πŸ΄β€β˜ οΈ Cloud Security: identity-first defense, control-plane visibility, logging & monitoring strategy
  • πŸ΄β€β˜ οΈ Security Research: vulnerability analysis and responsible disclosure across production platforms
  • πŸ΄β€β˜ οΈ Governance & Risk: RoE, safety & deconfliction, evidence handling, remediation verification

πŸ‘₯ Community, Policy & Global Security

  • πŸ΄β€β˜ οΈ Member, OWASP Foundation β€” application security community and standards
  • πŸ΄β€β˜ οΈ Contributor, UN IGF Policy Network on Cybersecurity & AI β€” cybersecurity, AI governance, risk frameworks
  • πŸ΄β€β˜ οΈ Member, United Nations β€” technology, inclusion, sustainable digital transformation
  • πŸ΄β€β˜ οΈ Member, Rewriting the Code β€” mentorship & professional development
  • πŸ΄β€β˜ οΈ Member, National Cybersecurity Student Association β€” awareness, education, community discussions
  • πŸ΄β€β˜ οΈ Volunteer, Croix-Rouge FranΓ§aise β€” emergency readiness, coordination, community outreach

🏴 Certifications & Training (Full)

🏴 Red Team Leaders

  • Certified Red Team Operations Management (CRTOM)
  • Cyber Security Architecture v1
  • OpSec & Anonymity for Red Teams
  • Purple Team – Active Directory & AzureAD v1

🏴 Fortinet

  • Fortinet Network Security
  • FortiGate Administrator

🏴 Microsoft

  • Microsoft Azure Security Engineer Associate (AZ-500)
  • Computers and Operating Systems and Security

🏴 Google

  • Google Cybersecurity
  • Technical Support Fundamentals

🏴 Splunk

  • Splunk Search Expert

🏴 Cisco

  • Certified Ethical Hacker (CEH – Cisco)
  • Network Security

🏴 ISC2

  • Certified in Cybersecurity (CC)
  • Systems Security Certified Practitioner (SSCP)
  • Systems and Application Security
  • Security Principles
  • Security: Aligning Asset and Risk Management

🏴 Languages & Tools


🏴 Current focus

  • ATT&CK β†’ telemetry β†’ detection β†’ response β†’ retest loops
  • Detection quality over alert volume
  • Bridging technical security with governance, risk, and real-world impact

🏴 Not a resume β€” a signal

I don’t chase coverage. I chase proof.
If a control can’t be validated and retested, it’s just a rumor.

Pinned Loading

  1. PurpleTeam-Complete-Guide PurpleTeam-Complete-Guide Public

    Purple Team study guide: adversary emulation, detection validation, and retesting.

  2. RedTeam-Complete-Guide RedTeam-Complete-Guide Public

    A complete Red Team guide covering adversary emulation, operations, tradecraft, and safety.

    1

  3. CyberSec-Xperience CyberSec-Xperience Public

    A hands-on, advanced cybersecurity homelab for professionals and enthusiasts to learn, experiment, and master penetration testing, network security, and incident response.

    4

  4. BlueTeam-Complete-Guide BlueTeam-Complete-Guide Public

    A complete Blue Team guide covering detection, response, SOC operations, and defensive maturity.

    1

  5. ATTACK-Detection-Response-Library ATTACK-Detection-Response-Library Public