π IT Security Graduate β’ Cybersecurity Enthusiast β’ Defender of Digital Assets
Iβm a recent IT Security graduate with a passion for safeguarding digital landscapes.
I bring hands-on experience with SIEM solutions, incident response, security automation, and vulnerability management.
Driven by curiosity and a proactive mindset, I focus on fortifying systems and responding effectively to cyber threats.
My goal is to help organizations strengthen their defenses and protect their critical assets.
Building defenses, one layer at a time.
To leverage my skills in security monitoring, automation, and incident response to protect organizations from evolving cyber threats.
I am committed to continuous learning and applying proactive strategies to enhance security postures.
I aspire to grow as a cybersecurity specialist, contributing to innovative teams and impactful projects.
Skill | Associated Project |
---|---|
SIEM Implementation & Log Analysis | Detection Lab, Home SIEM Lab |
Network Traffic Monitoring & Attack Detection | Detection Lab |
Security Automation (SOAR) | SOC Automation Lab |
Incident Response Planning & Execution | SOC Automation Lab, Adversary Emulation |
Case Management (TheHive) | SOC Automation Lab |
Scripting for Threat Mitigation | SOC Automation Lab |
Network Tools:
pfSense
, Wireshark
, Security Onion
Endpoint Security:
Sysinternals
SIEM Solutions:
Splunk
, Azure Sentinel
, Security Onion
Automation & SOAR:
Shuffle
, TheHive
, Cortex
Scripting:
Python
, Bash
Cloud Platforms:
Microsoft Azure
Problem: Set up an environment to practice threat detection.
Action: Deployed Detection Lab to simulate real-world attacks and monitor system behavior.
Result: Gained deep experience in log analysis, attacker TTPs, and threat detection techniques.
Problem: Streamline SOC workflows and improve response time.
Action: Integrated SOAR solutions like Shuffle and TheHive for automated case management and response playbooks.
Result: Improved efficiency and reduced response times for incident handling.
Problem: Simulate enterprise monitoring in a home lab.
Action: Built a SIEM lab using pfSense, Splunk, Kali Linux, Security Onion, and Active Directory.
Result: Enhanced threat detection by 25% and practiced incident response playbooks.
Problem: Detect attacker persistence in Azure environments.
Action: Configured and deployed Azure Sentinel, created custom analytics rules, and built monitoring dashboards.
Result: Improved detection capabilities and provided actionable insights for Azure-hosted resources.
Problem: Practice defensive strategies against simulated attacks.
Action: Emulated offensive tactics to test incident response capabilities.
Result: Strengthened detection strategies and refined incident response playbooks.
- π AWS Cloud Security Monitoring Lab
- π Vulnerability Management Lab with Nessus and Wazuh
- βοΈ Automating Incident Response with Python
(Upload your actual project screenshots and replace these URLs!)
I believe in continuous learning, collaboration, and giving back to the cybersecurity community.
Whether itβs building labs, contributing to open-source, or mentoring peers, I am committed to growing and helping others grow.
Like & follow for more.
- ποΈ Guest Speaker at XYZ Cybersecurity Meetup (Future goal!)
- βοΈ Blogging about Home Lab Projects on Medium [Coming Soon]
- π₯ Mentoring entry-level cybersecurity enthusiasts
Always open to collaborating on cybersecurity projects and sharing knowledge with the community.