Skip to content
View alejandroZ345's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report alejandroZ345

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
alejandroZ345/README.md

Typing SVG


β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ whoami --verbose
> Name   : Alejandro Zavala Zenteno
> Role   : Jr. Cybersecurity Professional & (soon to be) Computational Systems Engineer
> Cert   : ISC2 Certified in Cybersecurity (CC) Β· 2026–2029
> Base   : Morelia, MichoacΓ‘n Β· Mexico  [UTC-6]
> Focus  : SOC Operations | Detection Engineering | SIEM/XDR | Incident Response
> Status : [ Seeking remote security roles Β· Open to opportunities ]

β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ cat featured_project.md

Enterprise-grade Wazuh SIEM/XDR + TheHive IRP deployment β€” 9 phases covering the full SOC pipeline from stack deployment to automated incident response.

Highlights:

  • 5 custom XML detection rules (behavioral TTPs)
  • MITRE ATT&CK mapping across 7 techniques
  • Automated containment (<2s detection-to-block)
  • TheHive v5 integration via custom Python API bridge
  • 5 standardized triage runbooks

wazuh docker mitre-attack detection-engineering thehive active-response


β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ cat currently_running.log
[*] Wazuh SIEM Home Lab ........................ COMPLETE (9/9 phases)
    └─ Custom XML rules deployed ............... 5 rules (100001–100005)
    └─ Detection strategy ...................... Behavioral TTPs (Pyramid of Pain)
    └─ ATT&CK techniques covered ............... T1110 Β· T1078 Β· T1548 Β· T1565 Β· T1087 Β· T1082 Β· T1095
    └─ Active response mechanisms .............. firewall-drop (IP ban) + custom alert script
    └─ IRP integration ......................... TheHive v5 ← Wazuh (custom Python API bridge)
    └─ Triage runbooks published ............... 5 (one per custom rule)
    └─ Agents reporting ........................ Windows + Linux
    └─ SOC dashboard ........................... Custom OpenSearch KPI panel (5 visualizations)

[*] Next objectives ............................ QUEUED
    └─ [ ] ???

β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ cat skill_matrix.txt
[ Security Operations ]
  SIEM/XDR      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘  Wazuh Β· OpenSearch Β· Custom dashboards Β· Active response
  Detection Eng β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  XML rules Β· Behavioral TTPs Β· Telemetry analysis Β· Rule tuning
  Threat Hunt   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  FIM Β· Auth correlation Β· Discovery Β· C2 detection
  Incident Resp β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  TheHive v5 Β· Triage runbooks Β· Containment SOPs Β· Kill chain analysis
  Frameworks    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘  MITRE ATT&CK Β· NIST CSF Β· ISO/IEC 27001 (via ISC2 CC)

[ Infrastructure ]
  Linux         β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘  Ubuntu hardening Β· Debian Β· Bash scripting Β· syslog pipelines
  Containers    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  Docker Β· Docker Compose Β· WSL2 Β· IaC credential management
  Windows       β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  PowerShell Β· WazuhSvc Β· AD basics

[ Networking ]
  Protocols     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘  TCP/IP Β· DNS Β· SSH Β· VPN (Sophos)
  Hardware      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  Cisco Β· Ruckus Β· Switches Β· Routers
  Analysis      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  Wireshark Β· Nmap Β· Firewall config Β· iptables

[ Offensive (lab only) ]
  Tools         β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  Hydra Β· Nmap Β· Nikto Β· Metasploit Β· Kali Β· Reverse shells

β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ ls -la projects/
drwxr-xr-x  wazuh-soc-homelab/
β”‚
β”œβ”€β”€ Phase 1 Β· Stack deployment & credential hardening     [βœ“ DONE]
β”œβ”€β”€ Phase 2 Β· Windows agent & lifecycle management        [βœ“ DONE]
β”œβ”€β”€ Phase 3 Β· Linux agent & SSH brute-force simulation    [βœ“ DONE]
β”‚            └─ 1,815 auth failures Β· Level 10 alert triggered
β”œβ”€β”€ Phase 4 Β· File Integrity Monitoring (FIM)             [βœ“ DONE]
β”‚            └─ /etc/passwd tampering Β· Rules 554 & 550
β”œβ”€β”€ Phase 5 Β· Custom detection engineering & rule tuning  [βœ“ DONE]
β”‚            └─ Rules 100001–100005 Β· Pyramid of Pain shift
β”‚            └─ bash_audit pipeline Β· Behavioral TTP detection
β”œβ”€β”€ Phase 6 Β· MITRE ATT&CK mapping & standardization     [βœ“ DONE]
β”‚            └─ 7 techniques mapped Β· 5 triage runbooks
β”œβ”€β”€ Phase 7 Β· Custom SOC dashboard engineering            [βœ“ DONE]
β”‚            └─ 5 KPI visualizations Β· OpenSearch bypass
β”œβ”€β”€ Phase 8 Β· Active response & automated containment     [βœ“ DONE]
β”‚            └─ firewall-drop IP ban Β· <2s detection-to-block
β”‚            └─ 3 WSL2 architectural discoveries resolved
└── Phase 9 Β· TheHive IRP integration & API automation    [βœ“ DONE]
             └─ Custom Python API bridge Β· RBAC config
             └─ I/O race condition resolved Β· 100% alert delivery

β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ cat /etc/motd
"The goal is not to be better than everyone else,
 but to be better than you were yesterday."

Building in public Β· Documenting every step Β· Failing forward.

[ Stack ]

Wazuh TheHive Docker Ubuntu Kali OpenSearch Python Bash MITRE

[ Connect ]

LinkedIn ISC2


Typing SVG

Pinned Loading

  1. wazuh-soc-homelab wazuh-soc-homelab Public

    Enterprise-grade Wazuh SIEM/XDR + TheHive IRP deployment on WSL2: detection engineering, MITRE ATT&CK mapping, automated active response, SOC dashboards & incident case management. Full SOC pipelin…

    2

  2. docker-monitoring-stack docker-monitoring-stack Public

    Cloud-native observability stack featuring zero-instrumentation metrics and logging for Docker using Prometheus, Loki, and cAdvisor.

    1