CST student at Conestoga. I run a segmented 18-node home lab, ship scripts that actually detect things, and document every decision.
"Most people learn security by reading. I learn by building a lab that actually alerts when I'm wrong."
I'm a Computer Systems Technician student at Conestoga who learns by building things, then finding out why they're broken. My home lab isn't a checklist — it's 18 virtual machines across 5 isolated VLANs, running a full SOC stack because I wanted to understand what Security Onion actually sees when Kali attacks Metasploitable.
The log correlation engine I wrote parsed 14,822 entries on first run and flagged a brute-force chain I'd deliberately planted. The DevSecOps pipeline failed Trivy on my own container image. That's the point: I build until it's real enough to actually fail, then I fix it.
I'm pursuing work in SOC analysis or IT infrastructure — somewhere I can take rote knowledge from a classroom and apply it to something that matters.
Every project here runs against something real — either my own lab or a cloud environment. Output first, description second.
What you're actually getting.
Most candidates have read the textbook. I've broken production, fixed it, and written the post-mortem.
Click a lab to step through the live attack chain — command run, log generated, ATT&CK technique, and the detection rule that catches it. Offense and defense, side by side.
Three things in parallel right now: finishing the TryHackMe SOC Level 2 path, shipping the AWS cloud security project so the portfolio covers both on-prem and cloud, and pushing through the last stretch of CompTIA Security+ study. Every week something new goes on GitHub.
A segmented virtual lab environment running on VMware Workstation. One isolated VLAN per security zone, all traffic routing through pfSense, with Security Onion passively sniffing the SPAN port. Click any node to inspect.
VMware Workstation / Windows 11 / View on desktop for interactive diagram
I'm looking for a co-op placement starting Summer or Fall 2026 — SOC analysis, IT infrastructure, or security operations. Based in Kitchener-Waterloo, open to in-person, hybrid, or remote across Ontario.
If something in this portfolio is relevant to your team, reach out. I'll respond within a day.