Skip to content
View phamthanhsang-cs's full-sized avatar
🏎️
🏎️

Block or report phamthanhsang-cs

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
phamthanhsang-cs/README.md

Hi, my name is Sang !

Let's Connect !


Projects

SIEM Home Lab - Distributed Splunk Enviroment (Currently doing)

Project Blog

A self-built distributed Splunk SIEM home lab environment that mirrors an enterprise-level network, with focus on distributed deployment, multi-source data ingestion, and detection engineering readiness.

Skills Learned:

  • Setting up a distributed Splunk architecture: configuring and connecting indexers, cluster manager, and search head.
  • Building an enterprise-like network environment: dual firewalls, Windows domain controller, workstations, web application with DMZ and internal database.
  • Log ingestion and parsing: preparing to handle and normalize data from various sources.
  • Splunk data modeling for dashboarding and reporting.
  • Infrastructure as code: managing Splunk configurations via Git and KRSCONF.
  • Detection engineering and threat emulation exercises.

Tools Utilized: Splunk (Indexers, Cluster Manager, Search Head, Forwarders) · Check Point Firewall · Sophos Firewall · Windows Domain Controller · Web Application · KRSCONF · Git

Enviroment: Proxmox · Windows · Linux · Docker

SOC Home Lab - SOC in my Pocket (SOCIMP)

SOCIMP GitHub Repository

A full-fledged home lab Security Operations Center (SOC) designed to simulate real-world enterprise security environments.

Skills Learned:

  • Network Security, Endpoint Detection & Response (EDR)
  • SIEM Deployment & Management (Elastic Stack)
  • Threat Intelligence Integration (OpenCTI, MISP)
  • Security Automation & Orchestration (TheHive, Cortex, Shuffle)
  • Attack Simulation & Detection (Atomic Red Team)
  • SOC Workflow Design and Collaboration

Tools Utilized: OPNSense · Elastic Stack · OpenCTI · MISP · TheHive · Cortex · Shuffle · n8n · AtomicRedTeam

Enviroment: Proxmox · Windows · Linux · Docker

CTF Write-ups

Explore my threat hunting and log analysis write-ups from Splunk’s Boss of the SOC (BOTS) challenges. These write-ups demonstrate real-world skills in security operations, anomaly detection, and OSINT correlation.

CTF Challenge


Certification & Training

CompTIA Security+ TryHackme SOC Analyst Level 1 TryHackme SOC Analyst Level 2


Pinned Loading

  1. SOC-in-my-Pocket SOC-in-my-Pocket Public

    SOCIMP: design, build, implement and become a SOC Analyst in a foundational Security Operation Center enviroment.

    Shell 3 3

  2. Boss-of-the-SOC Boss-of-the-SOC Public

    Hunting threats with blue-team CTF Challenges Boss of the SOC