Background, approach, what I'm building next, and a SOC triage simulator you can actually use.
I didn't come up through a CS program. I came up through obsession with how systems break, and a compulsion to document everything so I could reproduce it.
Security clicked because it's the intersection of "how does this actually work" and "what happens when it doesn't." The adversary mindset — understanding attack chains well enough to write detections for them — is the part I keep returning to.
Everything on this site is self-directed. The lab, the rules, the playbooks, the verification pipeline — built because I wanted to understand how a real SOC workflow holds together, not because a course told me to.
I gravitated toward the automation side of security because that's where the leverage is. One well-written detection catches the same behavior a thousand times. One IR playbook keeps a responder from having to rebuild triage logic under pressure.
Active work in progress. Nothing ships to the public site until it has verified counts and at least one artifact.
Lightweight triage practice: select an alert, review severity context, execute next steps, and capture evidence cleanly. Each scenario maps to actual detection rules in the repo.
detection-rules/.incident-response/playbooks/.