SOC Analyst / Junior Security Engineer — Detection • SIEM • SOAR Automation

Built an AWS-hosted lab with Wazuh + Shuffle + DFIR-IRIS; published incident-style case studies with detections mapped to ATT&CK.

A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.

Cybersecurity Portfolio

This site showcases hands-on cybersecurity projects focused on threat detection, incident investigation, and security automation. I design and document practical lab environments that simulate real-world attack scenarios, emphasizing how alerts are generated, analyzed, and remediated.

My work is aligned with SOC Analyst and Junior Security Engineer responsibilities, including SIEM alert analysis, SOAR-driven enrichment, application security testing, and clear technical documentation.

A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.

About Me

I am a cybersecurity professional transitioning into a full-time security operations role, with a background in technical problem-solving and operational leadership. I focus on building and analyzing security labs that mirror enterprise environments, using tools such as SIEMs, SOAR platforms, and endpoint telemetry to investigate realistic attack scenarios.

My projects emphasize clear detection logic, structured investigation workflows, and documentation that mirrors how incidents are handled in professional SOC environments. This portfolio reflects my commitment to continuous learning and my goal of contributing as a SOC Analyst or Junior Security Engineer.