Tokyo · open to research collaboration

Senior DFIR
& detection,
in the seam
of automation.

Over a decade finding evil — now building agents that find it autonomously, and structurally cannot lie about what they found.

Name Bang Juwon · 방주원 · 優心
Role Senior DFIR Specialist
Based Tokyo, JP (KR ↔ JP)
Field DFIR · Detection · DevSecOps
Languages 한국어 · 日本語 · English
12+yrs In security DFIR & detection engineering, since 2014
1 Book published Network Attack Packet Analysis · 2019
4 Awards & recognitions NIPA · NIS · LINE · Netmarble
6+ Open-source DFIR tooling on GitHub
01

About

I work in the seam between incident response and automation — building agents that read forensic artifacts, correlate them against MITRE ATT&CK, and propose response actions a human can sign off on.

Day to day — detection engineering, host & network forensics, MCP tool design, vendor evaluation, and the unglamorous infrastructure work that makes any of it possible.

Working theory — most "AI for security" demos fail because they're prompt engineering with extra steps. The interesting problem is the architecture: tool boundaries, deterministic correlation, evidence chains, audit trails. Guardrails belong in the surface, not the system prompt.

Over a decade of doing this includes a co-authored book on packet-level attack analysis (Korea, 2019), a national OSS gold prize, a security-event correlation patent, and now a SANS hackathon entry that's also doubling as the baseline for an internal Agentic DFIR PoC.

GitHub
@Juwon1405
Mail
juwon1405.jp@gmail.com
YouTube
DoubleS1405 (KR infosec, since 2014)
Status
open to research collaboration
02

Published
& recognized

A book, four awards, one patent

Freelec · 2019 Network
Attack
Packet
Analysis
방주원 · 共著
ISBN 9788965402589
~370 pp

Network Attack Packet Analysis

Lead-author technical book · 2019

A practitioner's manual covering DDoS, web exploitation, malicious traffic analysis, wireless intrusion, system exploitation, and large-volume packet forensics. Written for SOC analysts and DFIR beginners stepping up.

Awards & recognition

2017
Gold Prize

Korea OSS Developer Contest

National IT Industry Promotion Agency (NIPA)

National open-source award for original contribution in security tooling.

2018
Patent filed

Security Event Correlation

Netmarble Corp.

Apparatus & method for correlation analysis of security events. Authored during infrastructure security tenure.

2017
4th Place · Finals

CCE National Cyber Defense

National Intelligence Service of Korea

Final round of the CCE National Cyber Defense Competition organized by the National Intelligence Service of Korea.

2015
Special Prize

LINE Bug Bounty

LINE Corp.

Vulnerability disclosure & remediation collaboration.

03

Selected work

Six open-source projects, one currently shipping

All repositories on GitHub →

04

Stack

Languages

  • Python
  • Bash · Zsh
  • TypeScript
  • Go (learning)
  • SQL · KQL · DuckDB

Detection & IR

  • MITRE ATT&CK
  • YARA · Sigma
  • Splunk · XSOAR
  • Arkime · Suricata
  • Velociraptor · KAPE

Forensics

  • SIFT Workstation
  • Plaso · log2timeline
  • Volatility 3
  • The Sleuth Kit
  • Eric Zimmerman tools

AI & infra

  • Anthropic API · MCP
  • Claude Code
  • LangGraph · Ollama
  • AWS · Bedrock
  • Docker · k8s · git
05

Now

Shipping agentic-dart for SANS FIND EVIL! 2026

due in

v0.6.0 live. Typed read-only MCP surface — native pure-Python forensic functions (now including cross-platform supply-chain IOC sweeps ported from mac-artifact-collector 📦) plus SIFT Workstation tool adapters. Full test suite passing on a fresh clone, audit-chained reasoning loop. Three evaluation tiers now in: synthetic reference, noise-injected realistic at ~1:30 IOC-to-benign, and the NIST CFReDS Hacking Case external benchmark (recall 0.10/0.40 → 0.50/0.80 after parse_registry_hive shipped).

Phase 1.3 deliverable collector-adapter shipped alongside (Velociraptor ZIP → evidence_root glue). Final QA, demo recording, and the Devpost form before the deadline.

06

Contact

Open to conversations on DFIR automation, agentic SOC, MCP tool design, and replication studies.