<aside> 🔖

Table of Contents

</aside>

Project Summary

Project Title: Designing a Full-Stack SOC Lab with Splunk | Building Detection, Alerting and Investigation Workflows Against Simulated Attacks.

Platform: On-Premises Hyper-V Lab Environment

Project Scope: Full end-to-end detection pipeline using Windows, Linux, and Splunk

Author: Athanasios Oikonomopoulos / B4ckD00rR4t

This project was developed to simulate a complete SOC environment, integrating detection engineering, alerting, and analyst triage. The lab was fully self-hosted using Hyper-V, and consisted of four virtual machines: a Splunk SIEM server (Ubuntu), a Windows 10 victim, a Kali Linux attacker, and a SOC Analyst workstation.

Throughout the project, I:

Every phase, from infrastructure to alert validation, was documented step-by-step, highlighting key decisions, configurations, and lessons learned during the build.

This project demonstrates my ability to construct a functioning SOC pipeline from scratch, integrate log sources, write SPL for triage, simulate threats, and operationalize detection logic in a hands-on, blue team setting. The skills practiced here are directly applicable to roles in detection engineering, SOC analysis, and security monitoring.

Whether you're a fellow student, blue teamer, or security professional reviewing this as part of my portfolio, I invite you to explore my approach and methodology. It reflects my technical capabilities, investigative mindset, and dedication to mastering practical, real-world cybersecurity operations.