Building a Professional SOC + AWS Lab: From Legacy Hardware to Cloud-Ready Workflows
Summary
This portfolio demonstrates my ability to design stable, reproducible SOC and AWS lab environments across legacy hardware, modern Windows, and WSL2. It combines hardware optimisation, Linux hardening, and cloud integration, producing portfolio-ready artefacts for employers or freelance clients. The labs reflect the Cloud SOC Analyst progression: IAM → Detection → Identity-Centric.
Legacy Hardware Recovery: Toshiba Laptop Lab
- Hardware: Toshiba Satellite L500-13W (2009), 4 GB RAM, legacy BIOS, USB 2.0
- Issues: Overheating, slow HDD, misconfigured keyboard
Approach:
- Installed MX Linux 23 (Debian stable, lightweight, predictable)
- Replaced HDD with SSD, fixed cooling system
- Installed defensive tooling: nmap, Wireshark, tcpdump, Lynis, ClamAV, OpenVAS
Outcome:
- Boot under 30 seconds, thermally stable under sustained scans
- Enabled early Blue Team, DFIR, and AWS experimentation
- Reinforced Linux, hardware, and system optimisation skills




Scaling Up: Windows 11 SOC Lab
Legacy hardware limited VM-based experimentation: RAM, CPU, and storage bottlenecks blocked packet capture, AWS integration, and multiple environments.
New Setup: i7 CPU, 16 GB RAM, SSD storage.
Impact:
- Runs multiple Blue Team and cloud tools concurrently
- Supports hands-on IAM and alert triage labs
- Provides reproducible, portfolio-ready outputs
3. WSL2: Lightweight, Reliable Cloud-Ready Lab
After testing VirtualBox and VMware, WSL2 + Ubuntu 24.04 became the core environment:
- Minimal RAM and CPU overhead, near-native SSD performance
- Smooth Windows integration
- Ideal for AWS CLI, Python automation, IaC tools, and SOC workflows
- Easy snapshotting:
wsl --export/wsl --import
Outcome: Most time is spent on security work, not environment maintenance.
4. Lab Architecture: Two-Folder SOC + AWS Structure
Folders: SOC Labs and AWS Labs — both follow the same internal structure:
1. Environment & Scope 2. Baselines 3. Attack Surface & Exposure 4. Logging & Visibility 5. Threats & Techniques 6. Detection & Analysis 7. Response & Hardening 8. Automation & Continuous Improvement
Tools & Coverage:
- IAM posture analysis, CloudTrail investigations, S3 security checks
- Log analysis, threat-hunting, Python automation, packet capture, network fundamentals
Portfolio Output:
- Every investigation or script becomes a GitHub repo, write-up, and reproducible artefact
- Demonstrates discipline, verification, and cloud SOC readiness
Reflection: Why This Matters for a SOC & Cloud Role
This multi-stage lab journey strengthens my ability to:
- Diagnose and repair failing systems
- Optimise OS performance under severe constraints
- Build reproducible, cross-platform lab environments
- Produce verifiable artefacts for employers or freelance clients
Impact: Enables consistent Blue Team, Python automation, and AWS security practice, aligned with remote SOC and Cloud Detection roles across the UK and EU.
