Skills beyond security

This is where you'll find a comprehensive overview of my cybersecurity skills. Explore my technical strengths in log analysis, threat detection, cloud security, and incident response. See how I'm equipped to add immediate value in a SOC Analyst or Blue Team role.

Technical skill set

I specialize in a range of critical cybersecurity skills, including:

  • SIEM Log Analysis: Proficient in analyzing logs to identify anomalies and potential security incidents.
  • Incident Response: Experienced in managing and responding to security incidents, following established protocols.
  • Threat Detection: Skilled in identifying and classifying potential threats using various tools and techniques.
  • Authentication and IAM Security: Focused on ensuring secure authentication practices and identity access management.
  • Cloud Security (GCP & Azure Fundamentals): Knowledgeable in securing cloud environments, particularly with GCP and Azure.
  • Phishing and URL Analysis: Adept at analyzing phishing emails and malicious URLs to protect against attacks.
  • OSINT Techniques: Skilled in using Open Source Intelligence (OSINT) for gathering and validating security information.
  • Digital Forensics Basics: Familiar with fundamental digital forensics principles and practices.
  • PowerShell Scripting: Capable of using PowerShell for analysis and automation tasks.

Hands-on projects

My skills have been honed through practical application in various cybersecurity projects:

  • Windows Event Log Analysis: Investigated Windows event logs to detect and analyze suspicious activities.
  • SIEM Alert Triage: Triaged and prioritized SIEM alerts to focus on the most critical security incidents.
  • Phishing Email and Malicious URL Analysis: Analyzed phishing emails and URLs to identify malicious content and prevent attacks.
  • OSINT Validation: Used OSINT tools and techniques to validate indicators of compromise and gather threat intelligence.
  • Authentication Log Analysis: Analyzed authentication logs to identify and respond to brute-force attempts.
  • GCP Cloud Security Labs: Hands-on experience with IAM, KMS, and monitoring tools in Google Cloud Platform.

These projects demonstrate my ability to detect threats, conduct thorough investigations, document findings, and recommend effective remediation strategies.

Target roles

I am actively seeking entry-level cybersecurity roles, including:

  • SOC Analyst
  • Cybersecurity Analyst
  • Cloud Security Analyst
  • Blue Team Roles

I am particularly interested in positions focused on threat detection, log analysis, incident response, and cloud security operations. I'm eager to apply my skills and contribute to a strong cybersecurity team.