SOC Analyst / Cybersecurity Analyst

Efrain Reyes

I help detect and investigate suspicious activity by analyzing logs, alerts, and network traffic. I’m actively building a portfolio based on real security scenarios and documenting my work on GitHub. I hold CompTIA Security+ and I’m currently pursuing a degree in Cybersecurity.


ABOUT
I help detect and investigate suspicious activity by analyzing logs, alerts, and network traffic. I’m actively building a portfolio based on real security scenarios and documenting my work on GitHub. I hold CompTIA Security+ and I’m currently pursuing a degree in Cybersecurity.


Technical Skills

  • SIEM Monitoring (Splunk / Elastic / Sentinel basics)

  • Log Analysis (Windows Event Logs, authentication logs)

  • Network Traffic Analysis (Wireshark)

  • Incident Response Basics (triage → investigation → reporting)

  • Phishing Detection & Email Analysis

  • Linux + Windows fundamentals

  • Vulnerability basics (CVE awareness)

Soft Skills

  • Clear reporting & documentation

  • Attention to detail

  • Calm under pressure

  • Strong communication


Projects Section

Phishing Email Investigation (SOC Report)

  • Checked sender, headers, links, attachments

  • Extracted IOCs

  • Gave a verdict + recommended actions


Network Threat Detection Using Wireshark + Logs

  • Network Traffic Analysis

  • Network Security Monitoring

  • Web Security Monitoring


Endpoint Log Detection (Windows + Linux)

  • Investigated Windows Event Logs / Sysmon type activity

  • Found suspicious processes and persistence clues

  • Learned Linux auth logs + common attacker footprints


SIEM Alert Triage (Splunk + Elastic)

  • Took SIEM alerts → investigated → built timeline

  • Correlated logs across sources

  • Reduced noise / wrote notes like a real SOC ticket


SOC Capstone Investigations (Realistic Incident Cases)

  • Investigated compromised host(s)

  • Extracted evidence + scope

  • Final response actions + recommendations


DATACOM SOC

  • Completed a Cybersecurity Risk Assessment simulation through Datacom (Forage)

  • Identified key security risks and evaluated likelihood + business impact

  • Created recommendations to reduce risk, including MFA, least privilege access, and stronger security controls