Real-world incident investigation workflows with complete documentation. Demonstrates alert triage, IOC extraction, and ticket documentation skills.
This directory contains SOC-style incident investigation writeups demonstrating real-world security analysis workflows. Each casefile follows a structured format showing:
Status: Template
Skills Demonstrated: Email header analysis, URL/IP reputation checks, IOC extraction
Status: Template
Skills Demonstrated: Authentication log analysis, IP geolocation, threat intelligence enrichment
Status: Template
Skills Demonstrated: Endpoint detection analysis, file hash verification, containment procedures
Status: Template
Skills Demonstrated: Identity event correlation, geolocation analysis, user behavior analytics
Status: Real Evidence
Skills Demonstrated: Splunk query development, SIEM dashboard analysis, log correlation
Uses Actual Evidence: References real Splunk dashboard and queries from Log-Analysis project
See _Playbooks/ for reusable security playbooks covering common incident types.
Note: These casefiles are based on lab environments and public sample data. They demonstrate methodology and documentation skills rather than actual production incidents.