View on GitHub

Rodney Hall | Cybersecurity Portfolio

Hands-on cybersecurity portfolio covering SOC operations, incident triage, threat detection, identity management, cloud security, and OT/ICS environments.

Back to Portfolio

SOC Operations & Incident Triage

Overview

Across four structured investigations, I analyzed logs from SSH, HTTP, and FTP services to detect brute-force attacks and unauthorized access, triaged SIEM alerts tied to phishing and malware campaigns, traced IOC patterns across multi-source log data, and delivered a full end-to-end incident report covering detection through recovery. A parallel security assessment mapped a fictional organization’s control posture to the NIST Cybersecurity Framework and identified gaps requiring remediation. Each investigation produced structured documentation consistent with SOC Tier 1–2 analyst deliverables.

Objective

Conduct log analysis, SIEM-based alert triage, and incident response investigations across multiple simulated attack scenarios to produce analyst-grade documentation and recommendations.

Tools Used


Lab 1 — Log Analysis & Threat Hunting

What I Did

Evidence / Findings

Log review surfaced repeated failed SSH login attempts from a single external IP, followed by a successful authentication — consistent with credential stuffing leading to unauthorized access. HTTP and FTP logs showed enumeration behavior prior to the successful login event.

Outcome / Recommendations


Lab 2 — SIEM Investigation & IOC Extraction

What I Did

Evidence / Findings

SIEM alerts correlated a phishing email delivery event with subsequent outbound connection attempts to an external C2 domain. Log data showed credential reuse across internal systems following initial compromise, consistent with lateral movement and privilege escalation attempts.

Outcome / Recommendations


Lab 3 — Capstone: End-to-End Incident Investigation

What I Did

Evidence / Findings

Investigation identified an initial access event via phishing, followed by execution of a malicious payload, persistence mechanism installation via scheduled task, and lateral movement to a second internal host. The full attack chain mapped to the cyber kill chain from weaponization through actions on objectives.

Outcome / Recommendations


Lab 4 — Security Assessment (NIST CSF)

What I Did

Evidence / Findings

Assessment identified critical gaps in the Protect and Detect functions — no MFA enforcement on remote access paths, incomplete asset inventory, and no SIEM deployed. These gaps significantly reduced the organization’s ability to detect and respond to active threats in a timely manner.

Outcome / Recommendations