Building hands-on experience in security monitoring, Linux security, Python automation, SIEM investigations, GRC compliance, and incident response. Passionate about learning, problem-solving, and building real-world cybersecurity projects.
- Security: Threat Detection, SIEM Monitoring, Incident Response, Brute Force Detection, Log Analysis, IOC Documentation, Risk Assessment, GRC Compliance
- Tools: Splunk Cloud, Wireshark, Nmap, Linux CLI, Fail2Ban, PAM faillock, Metasploit (beginner)
- Scripting: Python, Bash
- Languages: SPL (Splunk Search Processing Language)
- Frameworks: MITRE ATT&CK, NIST CSF, ISO 27001, PCI-DSS, GDPR, CIS Controls
- Networking: TCP/IP, Ports, Protocols, Firewalls, SSH
- Systems: Kali Linux, Ubuntu, Windows
- Other: Documentation, Reporting, Power BI, Git/GitHub
Conducted a full security audit and risk assessment for a fictional fintech startup as a Junior GRC Analyst. Identified 14 risks across Critical, High, Medium and Low categories. Assessed 26 NIST CSF controls and 18 ISO 27001 controls. Delivered a 90-day remediation roadmap mapped to PCI-DSS and GDPR requirements. Skills: GRC, Risk Assessment, NIST CSF, ISO 27001, PCI-DSS, GDPR, Compliance Mapping
Built a Python script that automatically parses Linux authentication logs, detects brute-force patterns, flags suspicious IPs, and generates a structured incident report with MITRE ATT&CK and NIST mapping. Skills: Python, Log Analysis, Automation, MITRE ATT&CK, NIST Mapping
Ingested real Linux auth logs into Splunk Cloud, built 4 SPL detection queries, and created a live dashboard with bar charts, timeline analysis, and event tables. Mapped findings to MITRE ATT&CK T1110 and NIST controls. Skills: Splunk Cloud, SPL, SIEM, Dashboard Creation, MITRE ATT&CK, NIST Compliance
Simulated an SSH brute-force attack on Ubuntu, investigated authentication logs, and implemented automated IP blocking using Fail2Ban. Documented full attack timeline, IOCs, and defense configuration. Skills: SSH Security, Log Analysis, Fail2Ban, Incident Response, Linux Security
Configured account lockout protection using PAM faillock to defend against brute-force attacks. Simulated failed login attempts, triggered lockout policies, mapped findings to MITRE ATT&CK, and recovered system after accidental lockout. Skills: Linux Security, PAM Configuration, Authentication Security, MITRE ATT&CK, Incident Recovery
Analyzed PCAP files to identify anomalies, suspicious traffic, and common attack patterns. Skills: Packet Analysis, Network Security, Protocol Inspection
Configured user accounts, permissions, updates, and basic security controls. Skills: Linux Security, File Permissions, Hardening Practices
Automation script that outputs system uptime, CPU/memory usage, disk space, logged-in users, and active processes. Skills: Bash, Linux Monitoring, Automation
- Google Cybersecurity Professional Certificate β 2025
- IBM Cybersecurity Analyst Professional Certificate β 2025
| Project | Description |
|---|---|
| GRC-Security-Audit-CipherPay | Full GRC security audit mapped to NIST CSF, ISO 27001, PCI-DSS and GDPR |
| Splunk-SIEM-Lab | Splunk Cloud detection dashboard with SPL queries and MITRE ATT&CK mapping |
| Python-Log-Parser | Automated Python script for SSH brute force detection and incident reporting |
| SSH-BruteForce-Detection-Lab | SSH attack simulation, log analysis, and Fail2Ban defense |
| SIEM-Investigation-Lab | PAM brute-force detection with MITRE ATT&CK mapping |
| Wireshark-Network-Analysis | Packet captures + analysis reports |
| Linux-Security-Projects | Hands-on Linux hardening and security configurations |
| System-Health-Checker-Bash | Bash automation script for Linux system monitoring |
Keep checking back β I update this portfolio as I learn more! π
Keep checking back β I update this portfolio as I learn more! π