SOCSystem
Unified SOC dashboard integrating Splunk, Azure Sentinel, Snort, and VirusTotal for real-time threat monitoring. Automated alert aggregation reduced manual triage and shortened incident response loops.
Cyber Security professional focused on planning, executing, and validating security testing across enterprise environments. I work on security control validation, vulnerability remediation testing, and assurance aligned to NIST CSF, ISO 27001, and ASD Essential Eight — turning security requirements into repeatable test scenarios and clear evidence for both technical and executive stakeholders.
Unified SOC dashboard integrating Splunk, Azure Sentinel, Snort, and VirusTotal for real-time threat monitoring. Automated alert aggregation reduced manual triage and shortened incident response loops.
Built a virtual automotive network to model CAN Bus attack surfaces. Simulated real-world exploits, mapped threat vectors, and tested mitigations against cyber-physical vehicle networks.
ML-driven recommender comparing Linear Regression, KNN, and Random Forest on user interaction data. Random Forest emerged as the strongest model on engagement metrics.
Real-time gesture recognition pipeline combining computer vision and deep learning to translate sign language into sentences — accessible communication for users with speech impairments.
Delivering Cloud Security curriculum: cloud threat models, identity security, and platform hardening. Facilitating RangeForce labs, supporting assessment design and evaluation, and mentoring students from diverse backgrounds.
Co-led blue team defensive operations across simulated enterprise environments — directing triage workflows in SentinelOne, leading endpoint and network vulnerability assessments, and modelling adversary behaviour against MITRE ATT&CK to proactively close attack-surface gaps.
Triaged threats across Microsoft Sentinel and Splunk, ran incident investigations across endpoint, network, and cloud, and contributed to security architecture and identity reviews — alongside hands-on security control validation and risk assessment work.
Delivered foundational cyber security tutorials covering threat landscapes, cryptography, and network security. Adapted explanations to varying technical backgrounds and supported assessment marking with constructive feedback.
Monitored simulated enterprise environments during red vs blue team exercises. Performed incident response and triage with Splunk and CrowdStrike, identified endpoint and network vulnerabilities, and supported threat-hunting initiatives by correlating logs and anomalies against MITRE ATT&CK techniques.
Tier 1/2 support across hybrid infrastructure: patching, endpoint access, and IAM tasks including account provisioning, MFA configuration, and AD group policy. Participated in SOC-lite alert logging, credential reset validation, and O365 triage — and authored SOPs for service interruptions, policy inconsistencies, and user onboarding.
Open to SOC, security testing, and assurance roles — happy to talk about detection engineering, control validation, and cloud security work.
// four fragments. one system. break it open.
Watch the breathing form. Repeat the sequence. Three rounds — one mistake and the demon wins.
A cursed message intercepted. Reverse the Caesar shift to extract the domain expansion.
Anya wants peanuts. Navigate the maze, collect at least 12 peanuts, and reach her. Use arrow keys or WASD — or tap the controls below.
anya
Three rounds. Wait for the ◯ to flash, then strike. Strike too early — round resets. Three perfect strikes in a row to clear the node.