Skip to content
View alejandroZ345's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report alejandroZ345

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
alejandroZ345/README.md

Typing SVG

Open to Work


β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ whoami --verbose
> Name   : Alejandro Zavala Zenteno
> Role   : Jr. Cybersecurity Professional & (soon to be) Computational Systems Engineer
> Cert   : ISC2 Certified in Cybersecurity (CC) Β· 2026–2029
> Base   : Morelia, MichoacΓ‘n Β· Mexico  [UTC-6]
> Focus  : SOC Operations | Detection Engineering | SIEM/XDR | Observability | IR
> Status : [ Seeking remote security roles Β· Open to opportunities ]

β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ cat featured_projects.md

🟒 docker-monitoring-stack · ACTIVE

Cloud-native observability stack for Docker: zero-instrumentation metrics, centralized logs & unified dashboards β€” orchestrated via a single docker compose up -d.

Highlights:

  • 7-container stack: WordPress + MySQL (monitored app) + Prometheus + Grafana + Loki + Promtail + cAdvisor
  • Three pillars of observability under one pane of glass
  • WSL2-aware PromQL engineering (cgroup namespace workaround)
  • Loki 2.9.8 schema pinning + UID/GID volume collision resolved
  • 3-step incident diagnostic methodology documented

prometheus grafana loki docker-compose observability devops

βœ… wazuh-soc-homelab Β· COMPLETE

Enterprise-grade Wazuh SIEM/XDR + TheHive IRP deployment β€” 9 phases covering the full SOC pipeline from stack deployment to automated incident response.

Highlights:

  • 5 custom XML detection rules (behavioral TTPs)
  • MITRE ATT&CK mapping across 7 techniques
  • Automated containment (<2s detection-to-block)
  • TheHive v5 integration via custom Python API bridge
  • 5 standardized triage runbooks

wazuh mitre-attack detection-engineering thehive active-response


β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ cat skill_matrix.txt
[ Security Operations ]
  SIEM/XDR      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘  Wazuh Β· OpenSearch Β· Splunk Β· Elastic Stack Β· Active response
  Detection Eng β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  XML rules Β· Behavioral TTPs Β· Telemetry analysis Β· Rule tuning
  SOC Workflow  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘  Alert triage Β· Reporting Β· Escalation Β· SOC KPIs Β· Workbooks & lookups
  Threat Hunt   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  FIM Β· Auth correlation Β· Discovery Β· C2 detection Β· IDS fundamentals
  Incident Resp β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  TheHive v5 Β· Triage runbooks Β· Containment SOPs Β· EDR basics Β· Kill chain
  Frameworks    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  MITRE ATT&CK Β· Cyber Kill Chain Β· Pyramid of Pain Β· NIST CSF Β· ISO 27001

[ Observability / DevOps ]
  Metrics       β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘  Prometheus Β· cAdvisor Β· PromQL Β· Custom dashboards
  Logging       β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘  Loki Β· Promtail Β· LogQL Β· Centralized pipelines
  Visualization β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  Grafana Β· OpenSearch Dashboards Β· KPI engineering
  Orchestration β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  Docker Compose Β· Multi-container stacks Β· Service discovery

[ Infrastructure ]
  Linux         β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘  Ubuntu hardening Β· Debian Β· Bash scripting Β· syslog pipelines
  Containers    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  Docker Β· Docker Compose Β· WSL2 Β· IaC credential management
  Windows       β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  PowerShell Β· WazuhSvc Β· AD basics

[ Networking ]
  Protocols     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘  TCP/IP Β· OSI Model Β· DNS Β· SSH Β· VPN (Sophos)
  Hardware      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  Cisco Β· Ruckus Β· Switches Β· Routers
  Analysis      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  Wireshark Β· Nmap Β· Firewall config Β· iptables

[ Offensive (lab only) ]
  Tools         β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘β–‘β–‘  Hydra Β· Nmap Β· Nikto Β· Metasploit Β· Kali Β· Reverse shells

β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ systemctl status learning.service
● learning.service - Continuous Skill Development
     Loaded: loaded (/etc/systemd/system/learning.service; enabled; preset: enabled)
     Active: active (running) since Mon 2026-01-01; always
   Main PID: 1337 (always_learning)
     Status: "Building toward remote SOC Analyst & Detection Engineering roles"
      Tasks: 4 (focused)
     Memory: 100%
        CPU: full-throttle

   Active units:
   ● detection-engineering-lab.target        active  (expanding custom ruleset)
   ● docker-observability-phase-4.service    active  (performance analysis & diagnostics)
   ● tryhackme-soc-level-1.path              active  (blue team path in progress)
   ● english-technical-writing.service       active  (daily)

   Queued for start:
   β—‹ comptia-security-plus.target            queued
   β—‹ blueteam-labs-ctfs.service              queued
   β—‹ kql-sentinel-fundamentals.service       queued

β”Œβ”€β”€(recruiterγ‰Ώinterested)-[~]
└─$ cat hire_alejandro.txt
[ Open to ]
  β€’ Jr. SOC Analyst (Tier 1 / Tier 2)
  β€’ Detection Engineer (Junior)
  β€’ Blue Team / Threat Hunter (Junior)
  β€’ Security Operations Β· Observability-adjacent roles

[ Availability ]
  β€’ Full-time Β· Remote-first (worldwide)
  β€’ Timezone    : America/Mexico_City (UTC-6) β€” flexible overlap with LATAM / US / EU-early
  β€’ Languages   : Spanish (native) Β· English (technical proficient)
  β€’ Start date  : Immediate Β· Notice period: none

[ Fastest way to reach me ]
  β†’ LinkedIn DM    (usually reply within 24h)
  β†’ See contact badges below

β”Œβ”€β”€(alejandroγ‰Ώsec-ops)-[~]
└─$ cat /etc/motd
"The goal is not to be better than everyone else,
 but to be better than you were yesterday."

Building in public Β· Documenting every step Β· Failing forward.

[ Stack ]

Wazuh TheHive Prometheus Grafana Loki Docker Ubuntu Kali OpenSearch Python Bash MITRE ATT&CK


[ Connect & Profiles ]

LinkedIn ISC2 CC TryHackMe


Typing SVG

Pinned Loading

  1. wazuh-soc-homelab wazuh-soc-homelab Public

    Enterprise-grade Wazuh SIEM/XDR + TheHive IRP deployment on WSL2 and Docker: detection engineering, MITRE ATT&CK mapping, automated active response, SOC dashboards & incident case management. Full …

    3

  2. docker-monitoring-stack docker-monitoring-stack Public

    Cloud-native observability stack featuring zero-instrumentation metrics and logging for Docker using Prometheus, Loki, and cAdvisor.

    1