I’m a Computer Science student with a specialization in Cybersecurity and particulary focused on Security Operations (SOC), with hands-on experience in building and analyzing real-world security systems.
My work revolves around threat detection, log analysis, and network monitoring, where I simulate attacks, analyze system behavior, and understand how security teams detect and respond to incidents.
I’m particularly interested in defensive security, including SIEM systems, incident response, and applying security principles to modern systems.
- Performing SOC-style analysis of cyber incidents using real-world attack scenarios
- Identifying indicators of compromise (IoCs) through log and behavior analysis
- Applying SIEM concepts such as log correlation and alert reasoning
- Analyzing network-level behaviors for potential threats
- Exploring security architectures based on Zero Trust principles
- Security & Tools: Wireshark, Nmap, Kali Linux
- Languages: Python, Java
- Concepts: SIEM, Incident Response, Log Analysis, Network Security, ZTA
- SIEM and detection engineering
- Threat hunting and incident response workflows
- Real-world attack simulation and defense strategies
- Security standards like GDPR, HIPPA, ISO - 270001