Mission
Deliver reliable, observable, and secure systems by applying incident response best practices and analytics to reduce risk, improve response times, and enable continuous learning for teams.
I aim to build secure, reliable systems by combining incident response discipline with data-driven decision making. My short-term focus is earning a role as a Security Analyst / SOC or Data Analyst, while developing automation that shortens the path from detection to recovery.
Deliver reliable, observable, and secure systems by applying incident response best practices and analytics to reduce risk, improve response times, and enable continuous learning for teams.
Become a security engineer who designs automation and playbooks that bridge detection to recovery, mentors junior analysts, and helps organizations make evidence-based decisions at scale.
Specific: Complete 2 SOC/IR or Windows forensics labs per week and capture a brief write-up.
Measurable: ≥8 labs per month + 8 summaries (private notes or blog).
Achievable: Leverage TryHackMe/labs and course materials.
Relevant: Aligns to Security Analyst/SOC roles.
Time-bound: Maintain cadence through the semester.
Specific: Build a Python CLI that parses logs, enriches IOCs, and exports a timeline (CSV/JSON).
Measurable: 1 CLI + README + sample dataset + before/after example.
Achievable: Use Python stdlib + public IOC sources.
Relevant: Demonstrates detection-to-analysis acceleration.
Time-bound: MVP and docs before final portfolio submission.
Specific: Build a Power BI dashboard for a public security dataset (alerts/incidents) and present 3 insights.
Measurable: 1 PBIX (or screenshots) + short write-up with recommendations.
Achievable: Use Python for cleaning; Power BI for visuals.
Relevant: Communicates findings to non-technical stakeholders.
Time-bound: Publish visuals and write-up mid-semester.
Specific: Translate FOH live-ops practices into a 1-page “incident communications” checklist for security events.
Measurable: Checklist PDF + example scenario + reflection paragraph.
Achievable: Adapt existing IR/ops structures you’ve used.
Relevant: Improves clarity under pressure during incidents.
Time-bound: Complete before the portfolio mid-semester check-in.