Real-world cybersecurity labs, automation tools, and threat analysis projects demonstrating hands-on expertise.
Built a fully functional Security Operations Center lab environment simulating real-world enterprise security monitoring. Ingested logs from Windows Server, Linux endpoints, and network devices into Splunk for centralized analysis, alert triage, and incident documentation workflows.
Deployed and configured Snort IDS on a simulated enterprise network. Analyzed malicious PCAP files to identify attack signatures, C2 communication, lateral movement patterns, and data exfiltration attempts.
Developed a Python-based threat intelligence aggregator that automatically correlates IOCs from multiple open-source feeds, generates risk scores, and produces structured threat reports for SOC teams.
Conducted static and dynamic malware analysis in isolated FlareVM sandbox environments. Performed reverse engineering with Ghidra to understand malware behavior, persistence mechanisms, and C2 communication patterns.