Caught a Hacker Red-Handed… And Turned It into a Dashboard.

Blue Team SOC Analyst Portfolio showcasing real-world cybersecurity labs

Real-world threat detection. Zero fluff. All logs. I’m Andy! I am your future SOC Analyst with just enough charm and paranoia to do this job disturbingly well.

About Me

13 Years in IT. One Pivot. Infinite Logs.

👋Hi, I'm Angelus Taylor

Hi, I’m Andy Taylor. I used to fix servers and reset your boss’s password (again). Now? I chase digital footprints and catch bad guys, before they make the news.

This portfolio is a “learn-with-me” SOC analyst origin story, minus the radioactive spiders. Every detection rule, every busted Python script, every dashboard that almost took down my VM… it’s all here.

WHY? Because anyone can say they know security. I’d rather show you, unfiltered, unsensitized, and occasionally hilarious.

This isn’t a bootcamp brag reel. It’s a war journal… written in logs, detection queries, and caffeine-fueled incident reports.

Honeypot threat intelligence setup demonstrating detection engineering project

Live Projects

What You’ll Find Here

Python script for cybersecurity visualizations in a blue team detection lab

Security Log, Incident Detection Dashboard

Watch me simulate attacks, ingest logs, write detection rules, and respond like it’s Monday in a SOC.

MITRE ATT&CK analyst reviewing threat detection dashboard

Honeypot Threat Intel Dashboard:

I set the trap, attackers came, and I turned it into beautiful, terrifying data.

Entry-level SOC analyst portfolio highlighting security monitoring walkthrough

Progressive Skill

Growth

I’m documenting everything I learn in blogs, tutorials, and video walkthroughs, so you see not just what I know, but how I learn.

Painfully honest write-ups of what went wrong, what went right, and how I’m building SOC-level skills from the ground up.

My Cybersecurity Projects. Now with 85% More Chaos

SOC analyst dashboard project featuring log monitoring and incident response

Project 1: Security Log Monitoring & Incident Detection Dashboard

I simulated a brute force attack on my own server. Spoiler: I found it. Built a custom SIEM dashboard to catch it. Documented the entire thing like a crime scene investigator with better lighting.

  • I simulated a brute force attack on my own server. Spoiler: I found it.

  • Built a custom SIEM dashboard to catch it.

  • Documented the entire thing like a crime scene investigator with better lighting.

Step-by-step SIEM setup tutorial using Splunk and ELK Stack
  • 🔐 SIEM Platforms: Splunk (Free Tier), ELK Stack, Kibana

  • 🛡️ Detection Frameworks: MITRE ATT&CK, Sigma Rules

  • 🧠 Security Tools: Sysmon, OSSEC, Wireshark, Cowrie

  • 📊 Visualization: Plotly, Dash, Tableau, Kibana

  • 🧪 Scripting: Python, Bash, Regex (aka mental gymnastics)

  • ⚙️ Infrastructure: Linux, Windows Server, Cloudflare

  • 📁 Dev Tools: GitHub, Git, CI/CD (for cool automation things)

  • 🎓 Certs: CompTIA Security+, Google Cybersecurity Professional

My Blog

I Build Logs, Make Bad Decisions, and Learn Brutally Honest Lessons

No generic Medium blogs here. Every post is a chapter in my SOC analyst journey, full of "Oh sh*t" moments, real configurations, and security lessons I learned the hard way (so you don’t have to).

No blogs found

Don’t Take My Word For It...

GenseJap LLC | CEO Gregory Prescod

Cybersecurity resume showcase emphasizing SOC resume project

💬 “From SEO copy to secure PHP forms, Angelus built our entire site with laser focus and zero fluff. He didn’t just design a website, he crafted a conversion machine that perfectly mirrors our mission in maritime consulting."

NuVision Media | CEO Hubert Sanders

Junior blue team SOC training on log analysis SOC dashboard

💬 “Working with Angelus was like strapping a jet engine to our digital presence, he built our full web and mobile ecosystem from scratch and guided every technical move with precision. His infrastructure insights and SEO magic helped us amplify our reach and secure our digital assets with confidence."

700 Islands Adventure | Arool Major

Guide on how to get hired in cybersecurity with real-world labs

💬 “From SEO copy to secure PHP forms, Angelus built our entire site with laser focus and zero fluff. He didn’t just design a website, he crafted a conversion machine that perfectly mirrors our mission in maritime consulting."

Cybersecurity is Personal, So Is This Contact Form

Whether you're a hiring manager looking for a SOC analyst, a fellow learner, or a curious recruiter wondering how I turned log files into art, this form is for you.

Let’s Get in Touch, No VPN Required.

I may live behind multiple firewalls, but I’m easy to reach. Drop a message, schedule a walkthrough, or send me memes. Business inquiries, job offers, and cyber banter all welcome.

Currently Based: Vancouver, Canada (Global + Remote Available)

🌐 Willing to Relocate: Open | Remote Preferred

Slide Into My Inbox (Professionally, Please)

Email Me (No Spam, Just Logs + Laughs)

[email protected]

Call Me (But Only If You’re Not a Bot)

+1 (813) 308-1671

Book a Call (15-Min Risk-Free Cyber Banter)

Schedule Here

WhatsApp Because It’s 2025 and Who Calls?

Message Me

Frequently Asked Questions

Frequently Asked (and Slightly Entertaining) Questions

Q1. What roles are you currently looking for?

→ I’m actively open to junior SOC analyst roles, log analysis positions, detection engineering internships, or any cyber role where I can break things (ethically), fix them, and write reports about it.

Q2. Do you have hands-on cybersecurity experience?

→ Yep! While I’m pivoting from IT, my portfolio shows live SIEM builds, detection rules, attack simulations, honeypots, and automated threat dashboards, all built by me, in public, no fluff.

Q3. What’s your cybersecurity stack?

→ Splunk, ELK, Sysmon, Cowrie, MITRE ATT&CK, Wireshark, Python, Bash, GitHub, coffee, and stubbornness. (That last one’s essential.)

Q4. Can you explain technical stuff to non-technical folks?

→ Absolutely. My incident reports and dashboards are built to make security data readable for humans, not just robots or other analysts. Even your boss will get it.

Q5. Why should we hire you over another candidate?

→ I’m already showing you the work, not just listing buzzwords. I bring experience, real curiosity, technical skill, communication, and I look great in a dark terminal window.

Copyright 2025 Angelus Taylor. All rights reserved