SOC Analyst • Threat Hunting • Incident Response

Teddy | SOC Analyst Portfolio

A practical cybersecurity portfolio focused on real SOC workflows: triage, investigation, IOC extraction, malware analysis, and threat hunting — documented through TryHackMe labs and structured writeups.

Focus

Blue Team / SOC

Strength

Threat Hunting

Proof

GitHub Writeups

About

I document investigations like a real SOC analyst: structured notes, tools used, commands executed, findings, and real-world mapping (MITRE, IR steps).

Skills & Tools

A mix of SOC tooling, endpoint analysis, and hands-on lab investigation.

Blue Team / SOC

  • IOC extraction & triage
  • Windows Event Log analysis
  • Incident timeline reconstruction
  • Threat hunting methodology
  • Basic malware static analysis

Tools

  • Wireshark
  • Sysinternals (Process Explorer)
  • PEStudio
  • PowerShell (IR commands)
  • Nmap (recon)

Systems & Scripting

  • Windows
  • Linux (Kali, Ubuntu)
  • WSL (Kali Linux)
  • Bash basics
  • Python fundamentals

Featured Case Studies

Deeper writeups that show full workflow: hypothesis → evidence → conclusion.

TryHackMe Writeups

Organized by category. Each writeup includes: tools, commands, findings, and lessons learned.

Contact

If you want to discuss SOC roles, threat hunting, or my portfolio — reach out.