Mrciano Cybersecurity Portfolio
Detection engineering, incident response, and automation — showcased through an interactive, real-time Security Operations Center simulation and a professional CV.
> initializing soc modules...
> loading detections: cloud, endpoint, identity
> starting pipeline: ingest → normalize → correlate
> ready. tail -f /var/log/soc/events.log
[00:00:01] SIEM online
[00:00:02] EDR stream attached
[00:00:03] Threat intel synced
Threat-led detection engineering and continuous improvement.
Playbooks, SOAR workflows, and response at machine speed.
Reduced MTTR, increased detection coverage, measurable impact.
Live Security Operations Center
A live, simulated SOC showing detection, triage, containment, and resolution in real time.
- No events match filters
Privacy notice: This is a local simulation. No personal data leaves your device.
Selected Work
Case‑study style highlights that demonstrate outcomes and depth of work.

Cloud Threat Detection
Built detections for IAM misuse, key exfil, and persistence paths.

Ransomware IR Playbook
Containment and eradication playbook with automation hooks.

Endpoint Hardening
Baseline + CIS-aligned policies with exceptions workflow.