Chat on WhatsApp
HomeAbout SOC ProjectsPortfolio ServicesAcademy CertificationsBlog Contact →
For Recruiters · SOC Analyst · DFIR Specialist · Threat Intelligence
Case Studies & Investigations

SOC Projects & Investigations

Real-world cybersecurity investigations documented using professional DFIR methodology. Each case includes full scenario, MITRE ATT&CK mapping, IOCs, detection strategy, and analyst reasoning.

8
Investigations
2
TI Reports
18+
IOCs Documented
HIGH
Max Severity
SOC & DFIR Case Studies
📧HIGH
DFIR · Email Analysis · NexSecure Bootcamp

Phishing & Credential CompromiseFull Report

Spear-phishing on ABC Manufacturing Finance employee. M365 harvest, auto-forwarding rules, impossible travel detection. Full L1/L2 response.

VirusTotalAzure ADSIEMMX Toolbox
🦠CRITICAL
SOC · Malware · NexSecure Bootcamp

USB Malware Infection — AsyncRATFull Report

USB AutoRun exploit, PowerShell LOLBin, C2 beaconing port 4444, registry persistence. Memory forensics and org-wide threat hunt.

SysmonWiresharkVolatilityEDR
🔍CRITICAL
Penetration Testing · VAPT · NexSecure Bootcamp

VAPT — testphp.vulnweb.comFull Report

Black-box VAPT. SQLi CVSS 9.8, XSS CVSS 9.3, LFI CVSS 8.6. 7 findings with OWASP methodology. Burp Suite, SQLMap, Nikto, Nmap.

Burp SuiteSQLMapNiktoNmap
🕵️TLP:WHITE
Threat Intelligence · OSINT · Published Apr 2026

MutaCryptor Scam Network — TI Report v220-Page Report

First structured TI report correlating MutaEngine, VRV Security, and Zorvyn FinTech. 18+ IOCs, 3 BTC wallets, 8-phase attack chain, MITRE mapping.

OSINTBitcoin AnalysisMITRE ATT&CKDNS Forensics
🔴CRITICAL
SIEM · Threat Detection

SSH Brute Force Attack Detection

847 failed attempts detected via SIEM. Attacker IP traced, Sigma rule created, contained in 6 minutes. Linux auth log analysis.

SplunkSysmonSigma RulesAbuseIPDB
🕸️HIGH
OSINT · Phishing Investigation · Mar 2026

Fake Internship Phishing — Redynox & Arch Technologies

Investigated two fraudulent internship operations. Hidden fees, malicious links, domain spoofing, Gmail company emails, WhatsApp onboarding.

OSINTWhoisVirusTotalDomain Analysis
📊HIGH
SIEM · Log Analysis

Log Correlation & Threat Detection

Splunk + Sysmon correlation rules detecting multi-stage attacks. Process injection, registry persistence, and lateral movement identification.

SplunkSysmonWindows Event LogsSigma
🏰CRITICAL
Pen Testing · Active Directory · 🏆 Week 5 Award

Active Directory Attack Simulation

Kerberoasting, Pass-the-Hash, privilege escalation, ghost LSASS detection via Volatility. RTL × 0xDelta Research Week 5 Technical Precision Award.

MetasploitBloodHoundMimikatzVolatility
Development & Operations Projects
⭐ Featured · Live Deployed

Greenfield School Management System

React-based LMS — 12 modules, 4 user roles, dark mode, CRUD, CSV export. Live demo at cybernatelmsdemo.netlify.app

ReactJavaScriptCSS3Netlify
🌐 Live DemoGitHub →
Government · Digital Transformation

FG-LEA Nominal Roll System

Single-file HTML web app replacing Excel/Word for tracking 472 officers across 26 sections. Custom rank sorting (CO→2i/c→rank descending→DOP→SVN), CRUD operations, Word export.

HTMLJavaScriptXLSX.jsDocxTemplater
✓ Live — FG-LEA use
🚧 In Development · GDG OAU Hackathon

HealthLink NG

AI-powered health triage platform built for GDG OAU × Google hackathon, Health track. Gemini API for symptom analysis, FastAPI backend, React frontend.

ReactFastAPIGemini APIPython
⚙ In Development
🚧 In Development · CNIFP

Cyber Nate Intelligence & Forensics Platform

Full SOC simulation platform — alert triage dashboard, IR playbook, evidence locker, threat intel feed, report generator. Phase 1 built.

ReactPythonREST APINetlify
⚙ Phase 1 Complete

Looking to hire a SOC Analyst?

Open to remote SOC, DFIR, threat intelligence, and cybersecurity roles globally. Relocation-ready.

⬇ Download CV Get in Touch

Open to Remote SOC Roles · Relocation Ready (AU/CA/US/NZ/UAE) · cybernate22@gmail.com

Hire Me