๐ก My Cybersecurity Home Lab Mini SOC Environment
Over the past few months, I built a fully virtualized home lab designed to mimic a real SOC environment combining offensive testing, defensive monitoring, and layered security.
It gives me hands-on experience in threat hunting, network defense, alert correlation, and overall SOC workflows
๐ง Lab Setup Includes:
โข๐ Kali Linux โ Recon & exploitation
โข๐ง Ubuntu (Wazuh) โ SIEM for monitoring & correlation
โข๐ก pfSense โ Firewall + segmentation
โข๐งช Suricata IDS/IPS โ Threat detection & active blocking
โข๐ช Windows Server AD โ Domain & user management
โข๐ฏ Metasploitable โ Vulnerable target for testing
๐ฏ Key Achievements:
โข๐จ Detected Nmap stealth scans with custom Suricata rules
โข๐ซ Blocked malicious traffic using IPS mode
โข๐ Identified brute-force attempts via Wazuh alerts
โข๐ต๏ธโโ๏ธ Flagged Mimikatz credential dumping (MITRE T1003.001)
โข๐ Correlated pfSense โ Suricata โ Wazuh logs for validation
โข๐ก Set up FIM, vulnerability scans, and log-based detections
โข๐ Built a practical layered defense similar to real SOC environments
๐ Open to connecting with SOC analysts, cybersecurity pros, and recruiters letโs collaborate and grow together
The Hacker Playbook ๐ญ
A Practical Guide to Offensive Security Thinking (Ethical & Defensive)
The Hacker Playbook explains how real attackers think, plan, and operate so defenders and security teams can better detect, prevent and respond to attacks.
Core skills for installing, configuring, managing, and troubleshooting Linux servers in real-world environments. This foundation supports careers in system administration, DevOps, cloud and cybersecurity.
Terraform Full Guide From Basics to Advanced Automation
Terraform is a must-have skill for DevOps and Cloud Engineers. This guide takes you from basics to real-world infrastructure automation with confidence.