I am an aspiring Security Operations Center (SOC) Analyst focused on threat detection, incident investigation, and security monitoring using Microsoft security technologies.
I am building practical, hands-on experience in cybersecurity through real-world SOC labs using Microsoft Sentinel, Defender XDR, and Azure. My focus is on Blue Team operations β detecting attacks, analyzing logs, and investigating security incidents.
I learn best by doing, and I continuously improve my skills by working on practical security projects and studying real-world threat detection techniques.
My goal is to become a professional SOC Analyst capable of detecting, analyzing, and responding to cyber threats in real-world environments.
- Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)
- Microsoft Certified: Security Operations Analyst Associate (SC-200) β In Progress
- CompTIA Security+ β In Progress
- Microsoft Sentinel (SIEM)
- Kusto Query Language (KQL)
- Detection Engineering
- Log Analysis & Threat Detection
- Security Incident Investigation & Response
- Azure Security & Log Analytics
- MITRE ATT&CK Framework
- Alert Triage & Security Monitoring
I document my hands-on SOC labs and detection engineering projects here:
π https://github.com/olatunjiabel231-coder/sc200-soc-portfolio
Projects include:
- SOC Environment Setup (Microsoft Sentinel) β Completed
- Detection Engineering & Brute Force Login Detection β Completed
- Ongoing β Security Incident Investigation
- Ongoing β Threat Hunting with KQL
- Microsoft Sentinel
- Microsoft Defender XDR
- Azure Portal
- Log Analytics Workspace
- KQL
- MITRE ATT&CK
- Advanced KQL for Threat Hunting
- Detection Engineering in Microsoft Sentinel
- Real-world Incident Response
- Threat Investigation Techniques
GitHub: https://github.com/olatunjiabel231-coder
I am continuously learning, building, and improving towards becoming a professional SOC Analyst.