Authentication
Brute Force Detection
Windows log review, anomalous patterns, TP determination, and alert tuning recommendations.
Read investigation →SOC Analyst Portfolio
Blue-team focused cybersecurity analyst specializing in detection engineering, investigation, and evidence-driven reporting.
Evidence-driven
Full investigations with log analysis, ATT&CK mapping, and response actions.
Authentication
Windows log review, anomalous patterns, TP determination, and alert tuning recommendations.
Read investigation →Network
Network flow and OSINT correlation to isolate C2 traffic, contain hosts, and recommend controls.
Read investigation →Endpoint
Process lineage review, persistence checks, threat intel enrichment, and remediation actions.
Read investigation →Hands-on practice
Documented exercises showing applied skills and takeaways for SOC operations.
TryHackMe
50+ rooms completed with SOC workflows, log parsing, Sigma/YARA, and VirusTotal enrichment.
View training log →DetectionLab
20+ hours of baselining, lateral movement traces, malware execution review, and KQL/PowerShell queries.
View exercises →SIEM
Splunk correlation scenarios, alert rule tuning, dashboarding, and performance metrics.
View SIEM notes →Automation & OSINT
Operational helpers built for enrichment, reconnaissance, and log analysis.
Python
Automates AbuseIPDB, VirusTotal, OTX, Shodan, and GeoIP lookups with investigation-ready output.
Read documentation →Recon
DNS, WHOIS, SSL, subdomain discovery, tech fingerprinting, and phishing domain risk scoring.
Read documentation →Analytics
Z-score and behavioral baselines to surface brute-force, unusual access, and exfiltration anomalies.
Read documentation →Education
Continued learning
Open source
Automatically pulled from public repositories.
Loading projects…
Resume & contact
Career-pivot resume focused on SOC Analyst (Tier 1) / Junior Cybersecurity Analyst roles with a Purple Team mindset.
Need a PDF? Export this resume page to PDF and add it as resume.pdf in the repository root for a direct download.