A collection of my hands-on cybersecurity projects, built in my home lab to practice SOC analyst workflows, detection engineering, and incident response.
I use this repo to document my learning process, share configurations, and showcase detection techniques aligned with the MITRE ATT&CK framework.
- SIEM: Wazuh (log collection, alerting, correlation)
- IDS: Suricata (network intrusion detection, custom rule writing)
- Endpoints: Windows 11 VM (with Sysmon), Ubuntu/Kali Linux
- Networking Tools: Nmap, Wireshark
- Scripting: PowerShell, Bash
- Deployed Wazuh for centralized log collection.
- Integrated Windows (Sysmon) and Linux endpoints.
- Built detection rules mapped to MITRE ATT&CK (brute force, privilege escalation, persistence).
- Skills: SIEM, Log Analysis, Incident Response.
- Deployed Suricata to monitor network traffic.
- Wrote custom rules to detect:
- Brute force attempts
- Port scanning
- Suspicious PowerShell activity
- Tuned alerts to reduce false positives.
- Skills: IDS/IPS, Detection Engineering, Network Security.
- Configured Sysmon for advanced event collection.
- Forwarded logs to Wazuh for correlation.
- Detected simulated persistence and lateral movement.
- Skills: Sysmon, Windows Event Logging, Threat Detection.
- Documented detection and response workflows for:
- Brute force login attempts
- Malware execution
- Privilege escalation
- Created repeatable incident response steps.
- Skills: Threat Hunting, MITRE ATT&CK, Incident Response.
- Conducted scans with Nmap to discover open ports & services.
- Simulated attacker reconnaissance.
- Compared results with vulnerability scans.
- Skills: Nmap, Recon, Vulnerability Testing.
- Each folder contains documentation, configs, and screenshots for a lab.
- Files are organized so others can reproduce the labs in their own environment.
- Example workflow:
- Review project README.
- Deploy VM(s).
- Import configuration files.
- Recreate detection & analyze alerts.
- Add more MITRE ATT&CK technique coverage
- Expand Suricata rules (HTTP, DNS, C2 detection)
- Integrate Elastic Stack dashboards
- Document incident response “case studies”
Dominic “DJ” Jones
- Aspiring Tier 1 SOC Analyst (San Antonio, TX)
- Currently working toward CompTIA A+ & Security+
- Building hands-on skills in detection engineering & incident response
🔗 Connect with me on LinkedIn
🔗 [More projects coming soon]