Aspiring SOC Analyst | Threat Detection | Blue Team
I’m building hands-on experience in threat detection, log analysis, and Windows security hardening through practical labs and documented investigations.
My path into cybersecurity hasn’t been linear and that resilience shows in how I approach security work: calm, methodical, and persistent.
I focus on understanding the why behind alerts, not just closing tickets.
- Microsoft Defender for Endpoint (MDE)
- Microsoft Sentinel (KQL Hunting & Analysis)
- Windows Event Logs & Sysmon
- DISA STIG Remediation
- Structured Incident Documentation
Hardening a Windows 11 VM against DISA STIG controls. Includes remediation steps, before/after evidence, and compliance validation.
Investigated abnormal login activity using KQL. Built detection queries and documented investigative reasoning.
Simulated LSASS dumping behaviour and analysed forensic artifacts. Correlated Event IDs and endpoint telemetry in a SOC-style report.
Building toward a SOC Analyst role where I can:
- Investigate alerts independently
- Recognise attacker behaviour patterns
- Communicate findings clearly
- Continuously improve detection quality