I'm a SOC Analyst with 1+ year of hands-on security operations experience, backed by 4+ years as a QA Engineer
That combination isn't common β and it's my edge. I bring structured, test-driven thinking to every alert I triage, every log I analyze, and every incident I document. My QA background means I approach threat analysis the same way I approached defect detection: methodically, with a sharp instinct for finding what others miss.
Current Focus: SOC Operations Β· Threat Detection Β· Incident Response Β· SIEM Analysis
Target Role: Tier I SOC Analyst / Threat Analyst
SIEM & Monitoring
Threat Analysis & Response
Cloud & Infrastructure
Frameworks & Standards
Version Control
Web
Database
Others
| Status | Certification |
|---|---|
| β Completed | AWS Cloud Practitioner |
| β Completed | Cisco CCNA |
| β Completed | Cisco CCENT |
| π In Progress | CompTIA Security+ (SY0-701) |
| π In Progress | CompTIA Network+ (N10-009) |
| π In Progress | Microsoft SC-900 |
|
Detection & Analysis
|
Response & Documentation
|
Hands-on SIEM labs and cybersecurity walkthroughs
- π‘ Analyzing FTP Log Files Using Splunk SIEM
- π Analyzing SSH Log Files Using Splunk SIEM
- π Analyzing HTTP Log Files Using Splunk SIEM
- π¬ Expanding SOC labs β building detection rules and hunting playbooks in Wazuh & Splunk
- π Security+ & Network+ β targeting certification completion in 2026
- βοΈ Medium blog β publishing hands-on SIEM walkthroughs and SOC methodology write-ups
- π§ CyberDefenders & TryHackMe β consistent blue team practice
Open to SOC Analyst Β· Tier I Analyst Β· Threat Analysis opportunities
