Security Projects
Hands-on implementations demonstrating real-world security expertise
Featured Projects
Hands-on security implementations with real-world applications
Wazuh SIEM Home Lab Project
SIEM & Threat DetectionπKey Accomplishments
- βBuilt and maintained a Wazuh SIEM home lab with a centralized agentβserver architecture to enable real-time security monitoring and detailed log analysis
- βDetected and investigated external SSH brute-force attacks by monitoring repeated failed login attempts
- βMapped security alerts to the MITRE ATT&CK framework, specifically correlating Brute Force (T1110) under the Credential Access tactic
- βConfigured and validated File Integrity Monitoring (FIM) to promptly identify unauthorized file modifications
- βMonitored privilege escalation attempts by tracking anomalous sudo and root-level command executions
π§Technologies Used
Wazuh SIEMLinuxMITRE ATT&CKFile Integrity MonitoringLog Analysis
Splunk Home Lab Setup: Setup and Log Ingestion
SIEM & Log ManagementπKey Accomplishments
- βInstalled and configured Splunk Enterprise on a virtual host machine as a centralized platform for log management and analysis
- βDeployed and set up the Splunk Universal Forwarder on a virtual client machine
- βEnsured secure collection and transmission of system logs to the Splunk server
- βEnabled real-time monitoring and analysis capabilities
π§Technologies Used
Splunk EnterpriseSplunk Universal ForwarderVirtualBoxLog Management
Microsoft Sentinel SIEM: Log Integration & Real-time Threat Detection
Cloud Security & SIEMπKey Accomplishments
- βDesigned and deployed a cloud-based cybersecurity lab on Microsoft Azure simulating real-world threat scenarios
- βConfigured a vulnerable Windows virtual machine (VM) to log unauthorized login attempts
- βForwarded security logs to a centralized Log Analytics Workspace (LAW)
- βCreated a unified view for easier monitoring and analysis of security events
π§Technologies Used
Microsoft AzureMicrosoft SentinelLog Analytics WorkspaceWindows VMCloud Security
Active Directory User & Group Policy Management
Identity & Access ManagementπKey Accomplishments
- βDeveloped and organized Organizational Units (OUs) to streamline user account management for each department
- βManaged user accounts within each OU, ensuring access rights were correctly assigned and maintained
- βCreated security groups by assigning users from multiple OUs to simplify permission management
- βImplemented a strong password policy enforcing complexity and minimum length requirements
- βConfigured an account lockout policy to bolster defenses against brute-force attacks
π§Technologies Used
Active DirectoryGroup PolicyWindows ServerSecurity PoliciesIAM
Hospital Network Design and Implementation
Network SecurityπKey Accomplishments
- βDesigned a comprehensive multi-site hospital network connecting headquarters and branch locations
- βDeveloped VLANs with strategic subnetting and enterprise-level segmentation to enhance network security
- βConfigured OSPF for dynamic routing, optimizing data flow and ensuring reliable communication
- βEstablished a centralized DHCP server to dynamically assign IP addresses
- βIntegrated both wired and wireless connectivity for seamless operations
π§Technologies Used
Cisco Packet TracerVLANsOSPFDHCPNetwork SegmentationSubnetting
Self-paced Courses: TryHackMe, Coursera, Udemy
Continuous LearningπKey Accomplishments
- βCompleted over 100 learning rooms on TryHackMe, enhancing practical cybersecurity skills by 60%
- βContinuously improved cybersecurity skills through self-paced training
- βPracticed hands-on real-world security scenarios
- βDeveloped skills in penetration testing, SOC operations, and threat hunting
π§Technologies Used
TryHackMeCourseraUdemyPenetration TestingSOC Operations
Interested in My Work?
These projects demonstrate hands-on experience with real-world security challenges. Let's discuss how I can contribute to your organization's security posture.