Skip to content
View Matt-Solo's full-sized avatar
🤞
🤞

Block or report Matt-Solo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Matt-Solo/README.md

👋 Matthew Solomon — SOC Analyst Portfolio

🔐 SOC Analyst (Entry-Level) | SIEM • Threat Detection • Incident Response 🔗 LinkedIn: https://linkedin.com/in/matthew-solomon-29a53b89 🧪 TryHackMe: https://tryhackme.com/p/MatthewSolomon 🐦 X (Twitter): https://x.com/diepreye7_d

🚀 About Me

I am an aspiring Security Operations Center (SOC) Analyst with hands-on experience in SIEM monitoring, alert triage, and incident investigation across simulated enterprise environments.

I have performed:

  • Security alert triage and investigation using Splunk and ELK
  • Log analysis across Windows Event Logs and Sysmon telemetry
  • Detection and correlation of suspicious activities
  • MITRE ATT&CK mapping and structured incident documentation

I am passionate about understanding attacker behaviour and contributing to teams responsible for detecting, analysing, and responding to security threats.

🛠️ Core Skills

  • SIEM: Splunk, Elastic Stack (ELK)
  • Alert Triage & Incident Response
  • Log Analysis: Windows Event Logs, Sysmon
  • Threat Detection & Investigation
  • Frameworks: MITRE ATT&CK, NIST CSF
  • Tools: Wireshark, VirusTotal
  • Scripting: Python (basic automation)

📁 SOC Projects

Project Title Description Tools
SOC Tier 1 Workflow Simulation — Monitoring, Triage & Escalation Simulated end-to-end SOC Tier 1 operations including continuous alert monitoring, investigation, prioritization, escalation, and structured incident reporting. Splunk, TryHackMe
SIEM Alert Triage & Incident Investigation (Splunk & ELK) Investigated security alerts using SIEM tools, performed log correlation, enriched indicators, mapped activity to MITRE ATT&CK, and documented incident response actions. Splunk, ELK, Sysmon
Windows Event Log Investigation — Threat Detection & Analysis Analysed Windows Event Logs and Sysmon telemetry to detect suspicious behaviour, identify attack patterns, and perform structured incident investigations. Event Viewer, Sysmon, SPL
Elastic SIEM Deployment & Log Monitoring — Detection Engineering Lab Deployed and configured an Elastic SIEM environment for centralized log ingestion, monitoring, alerting, and basic detection engineering use cases. Elastic Cloud, Filebeat, Kibana
SOC Operations & Incident Response — Tools, Workflows & Frameworks Documented SOC architecture, incident response lifecycle, and use of security tools aligned with MITRE ATT&CK and NIST frameworks. MITRE ATT&CK, NIST CSF

📊 What I Bring to a SOC Team

  • Ability to triage and investigate alerts efficiently
  • Strong log analysis and correlation skills
  • Clear and structured incident documentation
  • Hands-on experience with SIEM tools and detection workflows
  • Strong analytical thinking and attention to detail

🎯 Current Focus

  • Improving detection engineering and alert tuning
  • Strengthening incident response capabilities
  • Advancing SIEM query optimization (Splunk SPL / KQL basics)
  • Preparing for real-world SOC environments

📸 Screenshots

Screenshots and investigation evidence are included within each project repository.

🎯 Career Goal

To join a Security Operations Center (SOC) team where I can contribute to threat detection, incident response, and continuous security improvement while growing into a highly skilled security analyst.

“Cybersecurity is not just a job — it’s a mindset, and I am committed to growing in it every day.”

Popular repositories Loading

  1. Windows-Event-Viewer-Log-Analysis Windows-Event-Viewer-Log-Analysis Public

    Windows Event Log investigation for threat detection | Sysmon analysis, log correlation, and security event monitoring

    1

  2. Matt-Solo Matt-Solo Public

  3. A-Day-in-the-Life-of-a-SOC-Level-1-Analyst-TryHackMe- A-Day-in-the-Life-of-a-SOC-Level-1-Analyst-TryHackMe- Public

    SIEM alert triage & incident investigation using Splunk and ELK | Log correlation, MITRE ATT&CK mapping, SOC workflows

  4. SIEM-TryHackMe-Lab SIEM-TryHackMe-Lab Public

    SOC Tier 1 workflow simulation | Alert monitoring, investigation, prioritization, escalation, and structured incident response documentation

  5. SOC-Analyst-Fundamentals-Tools-Roles-Incident-Response-Frameworks SOC-Analyst-Fundamentals-Tools-Roles-Incident-Response-Frameworks Public

    SOC operations and incident response frameworks | SIEM tools, MITRE ATT&CK mapping, and security workflow documentation

  6. Setting-up-Elastic-Cloud-SIEM-Log-Monitoring-Lab Setting-up-Elastic-Cloud-SIEM-Log-Monitoring-Lab Public

    Elastic SIEM deployment and detection lab | Log ingestion, monitoring, alerting, and detection engineering use cases