$ whoami
> Cybersecurity student building toward SOC analyst role
> Focused on log analysis, detection engineering, and incident response
> Documenting every lab publicly — no shortcuts, no gatekeeping
- 🔍 SSH brute-force detection lab using Splunk SPL queries
- 📡 Packet analysis walkthroughs with Wireshark — documented with findings
- 📚 CompTIA Network+ domain-by-domain study notes (publicly tracked)
- 🛡️ Incident response playbook templates based on real scenarios
Every lab in this profile follows the same format:
| Section | What's Inside |
|---|---|
| Objective | What threat or scenario the lab simulates |
| Environment | Tools, OS, versions used |
| Steps | Numbered walkthrough with screenshots |
| Key Findings | What was detected and how |
| SPL / Commands | Actual queries and commands used |
| Lessons Learned | Honest reflection on what I learned |
🔴
splunk-ssh-brute-force-lab— Detecting SSH brute-force with Splunk SPL
🟡wireshark-packet-analysis— PCAP walkthroughs with annotated findings
🟢network-plus-study-notes— Network+ notes by domain, built in public
🔵soc-home-lab-setup— Full home lab documentation and config
💼 Open to SOC Analyst opportunities
Every commit here is a real lab. Every repo is a real skill.