root@prince /cyber-portfolio

/home/prince > whoami

Defending systems. Breaking things (legally). Shipping value.

I bridge security operations, offensive security, and systems administration to help organizations detect, respond, and harden against real-world threats.

Primary track SOC Analyst / Junior Pentester
Also open to System Admin / IT Support (Security-focused)
prince@kali: ~
$ nmap -sC -sV -T4 target.internal
$ ssh soc-analyst@siem.local
$ tail -f /var/log/suricata/fast.log
$ python exploit.py --target web-honeypot.lab
 

Security Value Proposition

I build hands-on security labs and workflows that map to real SOC use cases, adversary techniques, and operational reliability.

SOC & Detection

Log onboarding, correlation rules, alert triage, and incident documentation aligned to common playbooks (phishing, brute-force, web attacks).

  • SIEM
  • Windows Event Logs
  • Use-case mapping

Offensive Security

Recon, exploitation, and post-exploitation in controlled labs using industry tooling and methodology (OWASP, PTES).

  • Burp Suite
  • Nmap
  • Metasploit

Systems & Networking

Hardened Linux/Windows, OpenWrt lab routing, VPN tunneling for game and security traffic, and basic automation with shell/Python.

  • OpenWrt
  • WireGuard
  • Automation

Security Snapshot

0 + Hands-on lab hours (SOC & Pentest)
0 + Completed attack / defense scenarios
0 + Core tools in daily toolkit