From Ashes to Assets: The Phoenix Cipher Mission#

Welcome. If you are here, you likely share the same obsession I do: Blue Team Defense, Threat Hunting, Malware Analysis, Digital Forensics and more…

My name is Varun Belani, and I am the lead engineer and creator behind Phoenix Cipher.

I built this platform to solve a specific problem I faced when I started: The gap between “textbook theory” and “real-world application.” There are thousands of tutorials on how to hack, but far fewer on how to detect, analyze, and defend effectively.

Phoenix Cipher is my answer to that gap. It is a resource dedicated to helping people break into cybersecurity (specifically on the blue team side), Home Lab Construction, and Advanced Threat Detection.


Who Am I?#

I am a practicing Tier 2 Security Operations Center (SOC) Analyst and Cybersecurity Engineer. My daily work involves staring down the barrel of real threats, analyzing logs, and responding to serious cybersecurity incidents.

My expertise is built on the front lines, covering:

  • Digital Forensics & Incident Response (DFIR)
  • SIEM Architecture (Splunk, Wazuh, Security Onion)
  • Malware Analysis (CAPEv2)
  • Network Defense (pfSense, Suricata, Zeek)
  • Networking Architecture (Proxmox)

Credentials & Certifications#

  • Blue Team Level 1
  • Microsoft SC-200
  • CompTIA Security+

🔥 Why “Phoenix Cipher”?#

The name represents the cycle of continuous learning in cybersecurity. Dying to our avoidance of failure and having a “rebirth” in our cybersecurity journey.

  • Burn Bright: We aggressively pursue knowledge, burning through complex topics like malware analysis and network segmentation.

  • Ashes to Assets: We take the “burnt” remains of failed experiments and broken labs, learning from our mistakes to build stronger, more resilient “assets” (skills).


Where to Start?#

If you are new here, don’t wander aimlessly. I have curated a specific path to get your skills developed immediately:

Start with my Ultimate 2025 Cyber Lab Guide

This guide teaches you all the basics from IT networking architecture to blue team skills including setting up your own malware sandbox.


Let’s Connect#

I am always looking to collaborate with fellow Blue Teamers, students, and industry professionals.

Disclaimer: The views and opinions expressed on this website are my own and do not reflect the views of my employer.