- π Currently a Jr. SOC Analyst working on real-world incident detection, automation, and Blue Team challenges
- π± Actively learning Microsoft Sentinel, Defender XDR, and deepening proficiency in KQL
- π§ Completed the 30 Days MyDFIR SOC Analyst Challenge
- π Built Project CloudDecoy: a cloud-based honeypot lab on Azure and Microsoft Sentinel
- βοΈ Keen on automating SOC processes and integrating threat intelligence feeds
- π« Email: [email protected]
- SIEM: Wazuh, Splunk, Elastic Stack (ELK), Microsoft Sentinel
- SOAR: TheHive, Shuffle, Tines
- EDR: Sysmon, Elastic Defend, Windows Defender
- Threat Intel: MISP, VirusTotal, AbuseIPDB, GreyNoise
- Attack Simulation & Research: Mythic C2, DVWA, AD Lab
- Infra & Monitoring: Azure, Ubuntu, Kali, Windows Server, VMware
- Ticketing: osTicket
-
π Project CloudDecoy
A honeypot simulation lab on Microsoft Azure and Sentinel, visualizing real-world attacker behavior and intrusion attempts. -
π‘οΈ 30 Days MyDFIR SOC Analyst Challenge
A hands-on, guided SOC analyst lab journey using ELK, Sysmon, Microsoft Sentinel, and attacker simulation tooling. -
π Microsoft Sentinel: Hands-On Labs
Step-by-step SIEM, detection rule, automation, and dashboard labs in Microsoft Sentinel.
Let's connect and secure the cloud! π


