<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Timlab]]></title><description><![CDATA[Homemade tastes better!]]></description><link>https://www.timip.net/</link><image><url>https://www.timip.net/favicon.png</url><title>Timlab</title><link>https://www.timip.net/</link></image><generator>Ghost 5.59</generator><lastBuildDate>Sun, 03 May 2026 12:46:45 GMT</lastBuildDate><atom:link href="https://www.timip.net/blog/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Tim Ip - Security Researcher]]></title><description><![CDATA[<!--kg-card-begin: markdown--><h2 id="purple-team-dfir-splunker-offensive-security-k8s">Purple Team, DFIR, Splunker, Offensive Security, K8s</h2>
<p>I am extremely passionate about information security. With in-depth attacker mindset, I can identify security weaknesses and understand how they can be leveraged as part of a multi-stage attack. By understanding how combat is being conducted successfully, I can develop defense strategy and</p>]]></description><link>https://www.timip.net/blog/home/</link><guid isPermaLink="false">6300d10df3e99b401ab530ab</guid><dc:creator><![CDATA[TIMLAB]]></dc:creator><pubDate>Sat, 20 Aug 2022 12:18:21 GMT</pubDate><media:content url="https://www.timip.net/content/images/2023/08/1687242650143-1.jpg" medium="image"/><content:encoded><![CDATA[<!--kg-card-begin: markdown--><h2 id="purple-team-dfir-splunker-offensive-security-k8s">Purple Team, DFIR, Splunker, Offensive Security, K8s</h2>
<img src="https://www.timip.net/content/images/2023/08/1687242650143-1.jpg" alt="Tim Ip - Security Researcher"><p>I am extremely passionate about information security. With in-depth attacker mindset, I can identify security weaknesses and understand how they can be leveraged as part of a multi-stage attack. By understanding how combat is being conducted successfully, I can develop defense strategy and mount viable defenses to protect critical information asset.</p>
<p>Areas of Experience:</p>
<ul>
<li>Develop Security Strategy</li>
<li>Purple Teaming (Offense informs Defense, Defense informs Offense)</li>
<li>Threat Modeling and Threat Hunting</li>
<li>Forensics and Malware Reverse Engineering</li>
<li>DevSecOps and Automation (CI/CD, Docker, Kubernetes, Terraform, Vault, Ansible)</li>
</ul>
<!--kg-card-end: markdown--><hr><!--kg-card-begin: markdown--><h2 id="public-speaking">Public Speaking</h2>
<!--kg-card-end: markdown--><div class="kg-card kg-product-card"><div class="kg-product-card-container"><img src="https://www.timip.net/content/images/2023/09/1686275591773-3.jpg" width="2000" height="1131" srcset="https://www.timip.net/content/images/size/w600/2023/09/1686275591773-3.jpg 600w, https://www.timip.net/content/images/size/w1000/2023/09/1686275591773-3.jpg 1000w, https://www.timip.net/content/images/size/w1600/2023/09/1686275591773-3.jpg 1600w, https://www.timip.net/content/images/2023/09/1686275591773-3.jpg 2048w" sizes="(min-width: 720px) 720px" class="kg-product-card-image" loading="lazy" alt="Tim Ip - Security Researcher"><div class="kg-product-card-title-container"><h4 class="kg-product-card-title">Automating Cloud Forensics Lab Provisioning</h4></div><div class="kg-product-card-description"><p>FIRSTCON23</p></div><a href="https://www.first.org/resources/papers/conf2023/FIRSTCON23-TLP-CLEAR-Ip-Automating-Cloud-Forensics-Lab-Provisioning.pdf?ref=timip.net" class="kg-product-card-button kg-product-card-btn-accent" target="_blank" rel="noopener noreferrer"><span>Slide</span></a></div></div><div class="kg-card kg-product-card"><div class="kg-product-card-container"><img src="https://www.timip.net/content/images/2023/09/Screenshot-2023-09-15-at-12.54.49-AM.png" width="2000" height="1412" srcset="https://www.timip.net/content/images/size/w600/2023/09/Screenshot-2023-09-15-at-12.54.49-AM.png 600w, https://www.timip.net/content/images/size/w1000/2023/09/Screenshot-2023-09-15-at-12.54.49-AM.png 1000w, https://www.timip.net/content/images/size/w1600/2023/09/Screenshot-2023-09-15-at-12.54.49-AM.png 1600w, https://www.timip.net/content/images/2023/09/Screenshot-2023-09-15-at-12.54.49-AM.png 2080w" sizes="(min-width: 720px) 720px" class="kg-product-card-image" loading="lazy" alt="Tim Ip - Security Researcher"><div class="kg-product-card-title-container"><h4 class="kg-product-card-title">PAN Firewall Management Automation using Splunk</h4></div><div class="kg-product-card-description"><p>Palo Alto Networks Ignite Conference 2018</p></div></div></div>]]></content:encoded></item></channel></rss>