Cybersecurity Practitioner Portfolio Certifications Security Operations Lifecycle Capstone Enterprise IT Administration Capstone Jira Service Management KB Articles Phishing Analysis & Email Forensics Phishing Analysis Vulnerability Management OpenSCAP CIS Compliance Automation Vulnerability Management Program Implementation Automated STIG Compliance Scripts Threat Intelligence & Automated Response IOC Enrichment Pipeline SIEM, Logging & Incident Analysis Active Directory Splunk and SOAR Integration Splunk BOTS Write-Ups Threat Hunting & Security Operations Scenario-Based Threat Hunting Network Traffic Analysis & Detection Wireshark Malware Traffic Analysis All Write-Ups (Splunk BotS, TryHackMe, CyberDefenders, OverTheWire, HackTheBox, BTLO) Write-Ups Tools Operating Systems & Platforms SIEM & Security Monitoring Log Collection & Telemetry Network Security & Traffic Analysis Threat Detection & Intelligence Malware Analysis & DFIR Automation & Networking