SOC Log Analysis – Juicy Details
In this project, I acted as a SOC Analyst investigating a simulated breach of an e-commerce platform. By analyzing multiple log files (access.log, auth.log, and a server activity log), I traced brute-force login attempts, SQL injection exploitation, and file exfiltration methods. This exercise sharpened my ability to perform forensic triage, correlate log data, and document attacker behavior in a report-ready format.

You can click on the document above to view the full PDF, or you can click the link below to view the project on GitHub.