Download PDF Resume

Cybersecurity SOC Analyst Resume

Education

DAE Institute
Expected Graduation: December 2025

Studying cybersecurity with a focus on security operations, incident response, and threat detection.

Relevant Coursework: Python Programming, Cybersecurity Fundamentals, Digital Forensics, Network Security


Technical Skills

Security Operations & Monitoring

Digital Forensics & Investigation

Programming & Automation

Security Tools & Technologies


Cybersecurity Projects

Law Enforcement SOC Lab: Municipal Infrastructure Protection

September 2025 - December 2025 (In Progress)

Project Overview: Building a comprehensive Security Operations Center environment simulating protection of municipal law enforcement systems, focusing on critical infrastructure monitoring and digital evidence chain-of-custody management.

Core Infrastructure:

Detection & Monitoring:

Incident Response & Documentation:

Automation & Compliance:

Key Technologies: ELK Stack, Wazuh, Suricata, Python, PowerShell, Kali Linux, PostgreSQL, Windows Server, Syslog-ng, Metasploit, Nmap, Hydra

Portfolio Deliverables: GitHub repository with SIEM configurations and detection rules, 10–12 documented case investigations, incident response playbook library, demo video showcasing live attack detection and response


Incident Response Playbook & Lab Environment

June 2025

Project & Role: Designed and implemented an Incident Response Lab to simulate a ransomware attack on high-value confidential data, serving as both lab architect and incident response playbook developer.

Security Operations:

Incident Response Development:

Detection & Analysis:

Key Results:

Technologies: ELK Stack, Wazuh, Sysmon, pfSense, Metasploit, DVWA, Kali Linux, Windows Server, Linux (Apache, Postfix)


Experience

Cybersecurity Student Analyst

DAE Institute | June 2025 – Present


Certifications

Python Programming Fundamentals
Issued June 2025 | DAE Institute


Professional Summary

Aspiring SOC Analyst with hands-on experience in security operations, incident response, and SIEM deployment. Demonstrated expertise in building detection rules, conducting security investigations, and creating court-admissible documentation. Skilled in log analysis, threat detection automation, and digital evidence management. Currently developing specialized skills in law enforcement cybersecurity with focus on critical infrastructure protection and multi-agency coordination protocols.