$
whoami

Hi, I’m Sushil Shakya , a cybersecurity enthusiast with a strong focus on Security Operations and cyber defense.
This website showcases my hands-on cybersecurity projects centered on protecting digital assets in real-world scenarios. I have practical experience designing and implementing network security controls, intrusion detection and prevention capabilities, and centralized security monitoring and log analysis within a simulated SOC environment. All projects are built and tested in my personal home lab using virtualized infrastructure to replicate real-world enterprise setups. My work emphasizes threat detection, continuous monitoring, incident analysis, and system hardening to reflect modern defensive security operations.

$
ls ~/project/

Pinned Projects

Building a Phishing Simulation Lab for SOC Practice

Phishing attacks remain one of the most common cyber threats targeting banking institutions and employees. In this lab, I created a small cybersecurity environment to simulate a phishing attack and investigate it from a Security Operations Center (SOC) perspective.

The goal of this project was to gain practical experience in phishing attack simulation, credential harvesting techniques, and network-based detection using IDS and packet analysis tools.

Pinned Projects

File Integrity Monitoring (FIM) on Windows Endpoint using Wazuh SIEM

This project demonstrates the implementation of File Integrity Monitoring (FIM) on a Windows 10 endpoint using Wazuh SIEM. The objective is to detect unauthorized file creation, modification, and deletion in a simulated banking SOC environment.

$
cat ~/.profile
About


I’m Sushil Shakya, a cybersecurity enthusiast with a strong focus on Security Operations (SOC) and defensive cybersecurity. This website serves as a portfolio of my hands-on cybersecurity projects, where I demonstrate practical approaches to securing digital assets, monitoring environments, and responding to security events. My work emphasizes applying real-world security concepts rather than theoretical knowledge, reflecting how cybersecurity functions in operational environments.

I have hands-on experience with widely used open-source security technologies for network security, firewall management, intrusion detection and prevention, and centralized security monitoring. These technologies are used to simulate common SOC use cases such as network traffic inspection, threat and alert detection, event correlation, log analysis, and basic incident investigation.

All projects showcased on this site are built and tested within my personal home lab environment using VirtualBox, allowing me to design, deploy, and manage virtualized networks and security infrastructure independently. This setup enables me to replicate enterprise-style environments, practice defensive security workflows, and gain experience with system hardening, monitoring, and threat analysis in a controlled setting.

Through continuous hands-on practice, I aim to strengthen my skills in threat detection, security monitoring, log analysis, and incident response, aligning with the responsibilities of entry-level to junior SOC and Blue Team roles. This platform reflects my commitment to continuous learning and my readiness to contribute to real-world cybersecurity operations.

$
cat ~/.contacts
$
ā–ˆ