SOC & Pentesting Portfolio

This portfolio contains a complete SOC L2 investigation lab along with an extensive collection of hands‑on penetration testing writeups. It demonstrates both defensive and offensive security skills through real attack simulations, log analysis, SIEM investigation, exploitation workflows, and privilege escalation techniques.

SOC Investigation Cases

These cases simulate realistic attacker activity across Windows and Linux systems, with full SIEM visibility, timeline reconstruction, and incident documentation.

Each case includes evidence, SIEM queries, log artifacts, MITRE ATT&CK mapping, and conclusions based on the observed activity.

Hands‑On Penetration Testing Labs

This portfolio also includes more than 40 practical exploitation writeups across multiple platforms. These labs reinforce offensive security fundamentals such as enumeration, exploitation, privilege escalation, and post‑exploitation analysis.

Each writeup follows a structured methodology: reconnaissance, service enumeration, vulnerability analysis, exploitation, privilege escalation, and key takeaways.

Skills Demonstrated

Defensive / SOC

Offensive / Pentesting

Tools & Technologies