I built a lab environment to
simulate a Security Operations
Center (SOC) workflow using a
SIEM platform.
The project included:
Collecting logs from endpoints,
firewalls, and servers into the SIEM.
Creating correlation rules to detect
suspicious activities (e.g., brute
force attacks, malware traffic,
privilege escalation).
Generating reports to demonstrate
how threats were identified and
handled.
This project improved my hands-on
skills in log analysis, incident
response, and security monitoring,
and gave me practical experience
with real SOC operations