Security Projects

Hands-on implementations demonstrating real-world security expertise

Featured Projects

Hands-on security implementations with real-world applications

Wazuh SIEM Home Lab Project

SIEM & Threat Detection
πŸ”— View Project

πŸ“‹Key Accomplishments

  • βœ“Built and maintained a Wazuh SIEM home lab with a centralized agent–server architecture to enable real-time security monitoring and detailed log analysis
  • βœ“Detected and investigated external SSH brute-force attacks by monitoring repeated failed login attempts
  • βœ“Mapped security alerts to the MITRE ATT&CK framework, specifically correlating Brute Force (T1110) under the Credential Access tactic
  • βœ“Configured and validated File Integrity Monitoring (FIM) to promptly identify unauthorized file modifications
  • βœ“Monitored privilege escalation attempts by tracking anomalous sudo and root-level command executions

πŸ”§Technologies Used

Wazuh SIEMLinuxMITRE ATT&CKFile Integrity MonitoringLog Analysis

Splunk Home Lab Setup: Setup and Log Ingestion

SIEM & Log Management
πŸ”— View Project

πŸ“‹Key Accomplishments

  • βœ“Installed and configured Splunk Enterprise on a virtual host machine as a centralized platform for log management and analysis
  • βœ“Deployed and set up the Splunk Universal Forwarder on a virtual client machine
  • βœ“Ensured secure collection and transmission of system logs to the Splunk server
  • βœ“Enabled real-time monitoring and analysis capabilities

πŸ”§Technologies Used

Splunk EnterpriseSplunk Universal ForwarderVirtualBoxLog Management

Microsoft Sentinel SIEM: Log Integration & Real-time Threat Detection

Cloud Security & SIEM
πŸ”— View Project

πŸ“‹Key Accomplishments

  • βœ“Designed and deployed a cloud-based cybersecurity lab on Microsoft Azure simulating real-world threat scenarios
  • βœ“Configured a vulnerable Windows virtual machine (VM) to log unauthorized login attempts
  • βœ“Forwarded security logs to a centralized Log Analytics Workspace (LAW)
  • βœ“Created a unified view for easier monitoring and analysis of security events

πŸ”§Technologies Used

Microsoft AzureMicrosoft SentinelLog Analytics WorkspaceWindows VMCloud Security

Active Directory User & Group Policy Management

Identity & Access Management
πŸ”— View Project

πŸ“‹Key Accomplishments

  • βœ“Developed and organized Organizational Units (OUs) to streamline user account management for each department
  • βœ“Managed user accounts within each OU, ensuring access rights were correctly assigned and maintained
  • βœ“Created security groups by assigning users from multiple OUs to simplify permission management
  • βœ“Implemented a strong password policy enforcing complexity and minimum length requirements
  • βœ“Configured an account lockout policy to bolster defenses against brute-force attacks

πŸ”§Technologies Used

Active DirectoryGroup PolicyWindows ServerSecurity PoliciesIAM

Hospital Network Design and Implementation

Network Security
πŸ”— View Project

πŸ“‹Key Accomplishments

  • βœ“Designed a comprehensive multi-site hospital network connecting headquarters and branch locations
  • βœ“Developed VLANs with strategic subnetting and enterprise-level segmentation to enhance network security
  • βœ“Configured OSPF for dynamic routing, optimizing data flow and ensuring reliable communication
  • βœ“Established a centralized DHCP server to dynamically assign IP addresses
  • βœ“Integrated both wired and wireless connectivity for seamless operations

πŸ”§Technologies Used

Cisco Packet TracerVLANsOSPFDHCPNetwork SegmentationSubnetting

Self-paced Courses: TryHackMe, Coursera, Udemy

Continuous Learning

πŸ“‹Key Accomplishments

  • βœ“Completed over 100 learning rooms on TryHackMe, enhancing practical cybersecurity skills by 60%
  • βœ“Continuously improved cybersecurity skills through self-paced training
  • βœ“Practiced hands-on real-world security scenarios
  • βœ“Developed skills in penetration testing, SOC operations, and threat hunting

πŸ”§Technologies Used

TryHackMeCourseraUdemyPenetration TestingSOC Operations

Interested in My Work?

These projects demonstrate hands-on experience with real-world security challenges. Let's discuss how I can contribute to your organization's security posture.