SOC & Detection
Log onboarding, correlation rules, alert triage, and incident documentation aligned to common playbooks (phishing, brute-force, web attacks).
boot@prince
Launching cyber-portfolio…
/home/prince > whoami
I bridge security operations, offensive security, and systems administration to help organizations detect, respond, and harden against real-world threats.
I build hands-on security labs and workflows that map to real SOC use cases, adversary techniques, and operational reliability.
Log onboarding, correlation rules, alert triage, and incident documentation aligned to common playbooks (phishing, brute-force, web attacks).
Recon, exploitation, and post-exploitation in controlled labs using industry tooling and methodology (OWASP, PTES).
Hardened Linux/Windows, OpenWrt lab routing, VPN tunneling for game and security traffic, and basic automation with shell/Python.