SOC Analyst & Security Engineer

KaRIM

Threat detection. Incident response. Security automation.
Embrace the Unknown

Scroll

About

Who Am I

The person behind the handle — my background, focus, and what drives me.

A SOC Analyst and Computer Science student . My work lives at the intersection of detection engineering, incident response, and automation — building systems that find threats before they become breaches.

I've architected full Zero Trust environment, built IAM lab, and automated enrichment pipelines that cut triage time dramatically. Every project I ship reflects the same standard: rigorous, documented, and production-ready.

SOC
Analyst
3
Lab Projects

Core Stack

Wazuh Splunk ELK Stack Microsoft Sentinel KQL pfSense Suricata Python MITRE ATT&CK Volatility Wireshark FreeIPA Keycloak HashiCorp Vault Authelia Traefik VirtualBox Docker Nmap Cloudflare ZT

Security Professional

Karim Abdel-Nasser

LxZy

SOC Analyst · CS Student

📍
Cairo, Egypt
🎓
Computer Science
🛡️
Blue Team · Detection · IR

Background

Education

Where the foundation was built — academic rigor meets hands-on practice.

2023 – Present

B.Sc. Computer Science

Cairo, Egypt · Currently enrolled

Major: Cloud & Mobile Computing

Dec 2025 – Jul 2026

Digital Egypt Pioneers Initiative — DEPI

Computer and Information Systems Security / Information Assurance

Information Systems Security

Work

Experience

Roles where I've operated, defended, and delivered.

Ongoing

Security Research & Lab Engineering

Independent / Academic

Designing and deploying enterprise-grade security lab environments covering Zero Trust Architecture, Identity & Access Management, and Blue Team investigation workflows. Each lab is fully documented and built with production-grade open-source tooling.

VirtualBox ZTA pfSense Wazuh FreeIPA Keycloak Suricata DFIR

2025 – Present

Certifications

Courses & Certs

A structured pursuit of industry-recognized credentials across the security landscape.

SC-200

Microsoft Security Operations Analyst — SIEM, XDR, and Defender suite.

CompTIA Security+

Foundational security domains: threats, architecture, implementation, and governance.

CCNA

Networking fundamentals, routing/switching, and network security essentials.

RHSA I

Red Hat System Administration — Linux administration and command-line proficiency.

SANS SEC450

Blue Team Fundamentals — SOC analysis, DFIR, and analyst workflow.

AWS Cloud Practitioner

Cloud fundamentals and AWS security services overview.

eCIR

Certified Incident Responder.

What I offer

Services

Security capabilities I provide — from detection engineering to full incident response cycles.

🛡️

SOC Operations

24/7 threat monitoring, SIEM management, alert triage, and detection rule development aligned to MITRE ATT&CK.

🔥

Incident Response

Full IR lifecycle — containment, eradication, forensic analysis, and documented post-incident reports.

🔍

Threat Intelligence

IOC enrichment, threat actor profiling, and intelligence-driven detection engineering for your environment.

⚙️

Security Automation

Python-based automation for enrichment pipelines, SOAR playbooks, and repetitive analyst workflows.

Portfolio

My Projects

Production-quality labs and tools — fully documented, built with real open-source tooling.

01

Zero Trust Architecture Lab

A dual-pfSense, dual-device ZTA lab aligned to NIST SP 800-207. Spans two physical machines connected via IPsec site-to-site tunnel, with 4 VLANs, Suricata IDS on both firewalls, Wazuh SIEM aggregating cross-site logs, and a Docker stack serving Traefik + Authelia MFA behind Cloudflare Zero Trust WARP. Full attack simulation with an isolated Kali VM on VLAN 40.

pfSense x2 VirtualBox Suricata Wazuh Traefik Authelia Cloudflare ZT IPsec Tailscale Docker NIST SP 800-207
🔒
02

Linux IAM Lab

A full Identity & Access Management lab running on VirtualBox across 5 VMs. FreeIPA handles LDAP, Kerberos, DNS, and the internal CA. Keycloak federates identities and enforces TOTP MFA via OIDC/SAML. HashiCorp Vault manages secrets and PKI. Wazuh (Docker) captures all authentication events. WireGuard connects the management plane.

FreeIPA Keycloak HashiCorp Vault Wazuh WireGuard VirtualBox Docker LDAP Kerberos OIDC / SAML PKI
🗝️
03

SOC Investigation Lab

A practical Blue Team lab series covering 10 real-world SOC scenarios: authentication anomaly detection, phishing analysis, PCAP investigation, SIEM correlation, lateral movement hunting, detection rule development, incident response execution, and memory forensics on fileless malware. All labs produce reportable artefacts — investigation reports, detection rules, and automation scripts.

Splunk Elastic SIEM Volatility Wireshark Sysmon PowerShell Windows Event Logs MITRE ATT&CK DFIR
🔬
04

IOC Enrichment Tool

A Python automation script integrating VirusTotal and AbuseIPDB to dramatically reduce analyst enrichment time. Accepts bulk IOC lists (IPs, hashes, domains), queries multiple threat intel sources in parallel, and outputs structured reports ready for ticket ingestion.

Python VirusTotal API AbuseIPDB API Asyncio Threat Intelligence Automation
🔎

Get in touch

Let's build something secure.

Open to IR consulting, managed SOC engagements, and collaboration on security automation. Reach out — I respond fast.