I design, build, and validate detection systems.
SOC operations, log pipeline engineering, and threat detection — built from scratch through controlled home labs.


Operation Iron Watch 02 – IW-02
SIEM introduction – Graylog, web enumeration detection, SSH compromise analysis

Operation Iron Watch 03 – IW-03
DMZ expansion _ Suricata, physical segmentation, DDoS Detection Suite validated live

Operation PCAP Autopsy – PA-02
Lumma Stealer investigation — 13 Suricata rules across DNS, TLS, and HTTP layers, validated via PCAP replay.