Security • Engineering • Research

Cybersecurity Portfolio

I build defensive systems, break things responsibly, and document what I learn. Explore my homelab, CTF work, and projects.

Blue Team Network Security Threat Hunting Linux CTFs

About Me

Professional, focused, and practical security work

Snapshot

I am currently an IT specialist looking for a transition into the cybersecurity industry.

  • Core skills: SIEM, DFIR, alert triage, threat hunting.
  • Tools: Splunk/Wazuh, Suricata, Flare, Remnux.
  • Certs: Security+, CYSA+
  • Clearance: Secret

What I Do

SOC, Incident response, Security analyst, Threat hunter, Threat researcher.

Detect

Write detections and alerts with clear logic and low noise.

Hunt

Turn hypotheses into queries and validate with evidence.

Harden

Secure configs, baselines, and infrastructure patterns.

Homelab

Hands-on infrastructure for learning and experimentation

Lab Overview

My homelab is built as a hands-on cybersecurity playground where I can safely test, break, and learn. I run Proxmox as my virtualization platform to spin up and manage multiple isolated VMs efficiently, which lets me recreate real-world environments on demand. At the network edge I use IPFire as my firewall to segment traffic and keep lab activity contained, while still giving me control over routing and access policies. Inside the lab, I maintain dedicated forensics and malware analysis machines for investigating suspicious files and practicing analysis workflows in a controlled setting. I also host an Active Directory environment to experiment with authentication, domain administration, and common attack paths—giving me a realistic space to practice techniques, validate defenses, and improve my understanding of enterprise security. I also run a few other servers that run my detection and monitoring systems such as Wazuh being my SIEM to centralize logs from all of these different sources into one place where I can practice my threat hunting operations and detection rules. All of this is running off of 6 dell optiplexes and a ProtectCLI device to run IPFIRE as a router/firewall solution.

Featured Builds

Project

Network Visibility Stack

Suricata + dashboards integrated with IPFire for traffic analysis and alerting.

Project

Forensic machines

Both Flare and Remnux used for malware analysis and reverse engineering.

Project

Central Logging

Aggregate logs, normalize, and build detections with saved searches used in Wazuh or Splunk.

Server rack / networking equipment

CTF Competitions

Writeups, skills growth, and favorite challenge categories

Highlights

  • Web: auth bypass, SSRF, deserialization, logic flaws
  • Pwn: stack basics, ROP, heap fundamentals
  • Crypto: RSA pitfalls, encoding, randomness issues
  • Forensics: PCAP triage, file carving, memory artifacts

Recent Events

2026

CTF Name Here

Placement: — • Focus: Web / Forensics

2025

Blue Team CTF - Defcon

1st place: — • Focus: Forensics / alert analysis

2024

CTF Name Here

Placement: — • Focus: Reversing

Contact

Professional links and a safe, non-submitting form