π Cybersecurity Enthusiast | Aspiring SOC Analyst | IT Engineer
My mission is to grow into a skilled SOC Analyst who can detect, analyze, and respond to cyber threats β while documenting my journey and sharing resources with the community.
With a background in medical systems engineering, Iβm expanding my skills into Cybersecurity β focusing on SOC operations, threat detection, and hands-on labs.
My goal is to build a parallel career path in security while continuing to apply my engineering expertise.
- π± Learning: Network Security, SIEM (Splunk, ELK), Incident Response
- π οΈ Practicing: TryHackMe SOC1, HackTheBox, personal homelab projects
- π Goal for 2025: Build a SOC analyst portfolio with incident response workflows, detection rules, and documented labs
Core Skills
- Network Security, SIEM (Splunk, ELK), Incident Response
Tools & Platforms
- Linux (system administration, Bash scripting, log analysis, hardening basics)
- Python (automation scripts, log parsing, security utilities)
- Wireshark & tcpdump (network packet analysis, traffic troubleshooting)
- IDS/IPS (Snort, Suricata β detection rule testing and tuning)
- Virtualization (VMware, VirtualBox, building isolated homelabs)
- SIEM (Splunk, ELK β data ingestion, query building, dashboards)
Currently Exploring
- Threat Hunting, SOC Automation, Digital Forensics
(work in progress β repo will be updated as I learn)
- Incident response lab setup
- SIEM detection & custom rules
- SOC1 TryHackMe reports
Blue Teaming, Threat Hunting, SOC automation, Digital Forensics
πΈ Fun fact: When Iβm not hunting threats, I compose music and explore creative uses of AI β always curious about how technology and creativity intersect.