Skill 1: Security Operations and Threat Detection
Security operations and threat detection are at the core of modern cybersecurity defense. This skill focuses on monitoring systems, identifying suspicious activity, analyzing potential threats, and responding appropriately to security events. In a Security Operations Center environment, analysts are responsible for recognizing abnormal behavior, interpreting technical data, and making informed decisions that protect networks and systems. Throughout my degree program, I developed this skill through challenging coursework, hands on labs, and applied analysis of real world cybersecurity scenarios. The following artifacts demonstrate how my education prepared me for defensive and monitoring based cybersecurity roles.
Artifact 1.1: Cyber Techniques and Operations Assignment
This artifact comes from the course Cyber Techniques and Operations, which has been the most challenging course I have taken in my cybersecurity program. In this course, I learned how attackers exploit vulnerabilities and how cyber operations function at a technical level. Every command required precision, as even a small mistake such as an extra space or incorrect character could cause an entire task to fail. This experience emphasized the importance of attention to detail and accuracy, both of which are essential skills for security operations work.
While much of the course focused on ethical hacking techniques, it ultimately strengthened my defensive mindset. By understanding how attacks are carried out, I gained insight into how defenders detect suspicious activity and identify indicators of compromise. This artifact demonstrates my foundational understanding of attacker behavior, system vulnerabilities, and operational cybersecurity concepts that support monitoring and threat detection in a SOC environment.Artifact 1.2: Linux Based Cybersecurity Lab
This artifact highlights my experience working in Linux environments, which are widely used in enterprise networks and security operations centers. Through hands on lab exercises, I learned how to navigate the Linux terminal, execute commands accurately, and analyze system activity. Initially, working in Linux was frustrating and unfamiliar, but repeated exposure and practice improved my confidence and technical fluency.
This artifact demonstrates my ability to operate within real world systems and analyze system behavior. Linux skills are essential for security analysts who must review logs, investigate alerts, and interact with security tools that rely on command line environments. The lab experience helped me develop comfort with technical tools and strengthened my ability to identify abnormal behavior within operating systems, which directly supports threat detection responsibilities.
Artifact 1.3: Wireshark Packet Analysis Identifying Suspicious Network Activity
This artifact is a newly created Wireshark packet analysis designed to simulate the type of work performed by a Tier 1 security operations analyst. In this analysis, I examined captured network traffic to identify abnormal patterns, including repeated outbound connection attempts to a single external IP address within a short time window. While no confirmed malicious payloads were detected, the observed behavior indicated activity that required further investigation.
This artifact demonstrates my ability to monitor network traffic, interpret packet data, and identify potential security concerns. In a SOC environment, analysts must differentiate between normal network behavior and activity that could signal reconnaissance, misconfiguration, or malicious communication. This analysis strengthened my understanding of how network data is used to support detection and investigation processes. It also reflects my interest in monitoring and detection as a career focus within cybersecurity defense.
Summary
Together, these artifacts demonstrate my development in security operations and threat detection. Through challenging coursework, hands on technical labs, and applied network analysis, I gained practical experience in identifying suspicious activity and understanding defensive cybersecurity concepts. This skill set directly aligns with my goal of working in a Security Operations Center, where monitoring systems, analyzing threats, and responding to security events are essential responsibilities.