Caught a Hacker Red-Handed… And Turned It into a Dashboard.
Real-world threat detection. Zero fluff. All logs. I’m Andy! I am your future SOC Analyst with just enough charm and paranoia to do this job disturbingly well.
👋Hi, I'm Angelus Taylor
Hi, I’m Andy Taylor. I used to fix servers and reset your boss’s password (again). Now? I chase digital footprints and catch bad guys, before they make the news.
This portfolio is a “learn-with-me” SOC analyst origin story, minus the radioactive spiders. Every detection rule, every busted Python script, every dashboard that almost took down my VM… it’s all here.
WHY? Because anyone can say they know security. I’d rather show you, unfiltered, unsensitized, and occasionally hilarious.
This isn’t a bootcamp brag reel. It’s a war journal… written in logs, detection queries, and caffeine-fueled incident reports.
Watch me simulate attacks, ingest logs, write detection rules, and respond like it’s Monday in a SOC.
I set the trap, attackers came, and I turned it into beautiful, terrifying data.
I’m documenting everything I learn in blogs, tutorials, and video walkthroughs, so you see not just what I know, but how I learn.
I simulated a brute force attack on my own server. Spoiler: I found it. Built a custom SIEM dashboard to catch it. Documented the entire thing like a crime scene investigator with better lighting.
I simulated a brute force attack on my own server. Spoiler: I found it.
Built a custom SIEM dashboard to catch it.
Documented the entire thing like a crime scene investigator with better lighting.
🔐 SIEM Platforms: Splunk (Free Tier), ELK Stack, Kibana
🛡️ Detection Frameworks: MITRE ATT&CK, Sigma Rules
🧠 Security Tools: Sysmon, OSSEC, Wireshark, Cowrie
📊 Visualization: Plotly, Dash, Tableau, Kibana
🧪 Scripting: Python, Bash, Regex (aka mental gymnastics)
⚙️ Infrastructure: Linux, Windows Server, Cloudflare
📁 Dev Tools: GitHub, Git, CI/CD (for cool automation things)
🎓 Certs: CompTIA Security+, Google Cybersecurity Professional
No generic Medium blogs here. Every post is a chapter in my SOC analyst journey, full of "Oh sh*t" moments, real configurations, and security lessons I learned the hard way (so you don’t have to).
💬 “From SEO copy to secure PHP forms, Angelus built our entire site with laser focus and zero fluff. He didn’t just design a website, he crafted a conversion machine that perfectly mirrors our mission in maritime consulting."
💬 “Working with Angelus was like strapping a jet engine to our digital presence, he built our full web and mobile ecosystem from scratch and guided every technical move with precision. His infrastructure insights and SEO magic helped us amplify our reach and secure our digital assets with confidence."
💬 “From SEO copy to secure PHP forms, Angelus built our entire site with laser focus and zero fluff. He didn’t just design a website, he crafted a conversion machine that perfectly mirrors our mission in maritime consulting."
Whether you're a hiring manager looking for a SOC analyst, a fellow learner, or a curious recruiter wondering how I turned log files into art, this form is for you.
I may live behind multiple firewalls, but I’m easy to reach. Drop a message, schedule a walkthrough, or send me memes. Business inquiries, job offers, and cyber banter all welcome.
🌐 Willing to Relocate: Open | Remote Preferred
Email Me (No Spam, Just Logs + Laughs)
Call Me (But Only If You’re Not a Bot)
Book a Call (15-Min Risk-Free Cyber Banter)
WhatsApp Because It’s 2025 and Who Calls?
Frequently Asked (and Slightly Entertaining) Questions
→ I’m actively open to junior SOC analyst roles, log analysis positions, detection engineering internships, or any cyber role where I can break things (ethically), fix them, and write reports about it.
→ Yep! While I’m pivoting from IT, my portfolio shows live SIEM builds, detection rules, attack simulations, honeypots, and automated threat dashboards, all built by me, in public, no fluff.
→ Splunk, ELK, Sysmon, Cowrie, MITRE ATT&CK, Wireshark, Python, Bash, GitHub, coffee, and stubbornness. (That last one’s essential.)
→ Absolutely. My incident reports and dashboards are built to make security data readable for humans, not just robots or other analysts. Even your boss will get it.
→ I’m already showing you the work, not just listing buzzwords. I bring experience, real curiosity, technical skill, communication, and I look great in a dark terminal window.
LinkedIn
Instagram
TikTok
Mail