Summary
Building on my previous work scaling from legacy hardware to modern Windows, this stage focuses on creating a lightweight, reproducible SOC + AWS lab in WSL2 + Ubuntu 24.04. The objective was to freeze a minimum viable professional baseline: a curated, fully functional environment for Blue Team practice, Red Team learning, and cloud security automation.
1. Minimal, Verified Toolset
Every tool in the lab serves a clear, deliberate purpose — no tool-maximalism.
Blue Team Essentials: auditd, rsyslog, journalctl, tcpdump, htop, lynis, clamav
Note: auditd does not run natively under WSL2. Initially, I spent a frustrating hour troubleshooting it before confirming it was a known limitation. Documenting this became part of the lab discipline.
Red Team Learning Tools: nmap, gobuster, nikto, sqlmap, hydra, nc, traceroute, dig
Used exclusively to improve defensive intuition, not for exploitation.
Cloud Security Tools: AWS CLI v2, jq, Python3 + pip3, curl, openssl, Git
Verification: A simple shell loop confirmed all critical tools are operational:
for tool in tcpdump htop lynis aws jq python3 pip3 git; doif command -v $tool >/dev/null 2>&1; thenecho "$tool OK"elseecho "$tool MISSING"fidone
All returned OK, validating a fully operational lab.
2. Lab Architecture: Lightweight, Repeatable, Portfolio-Ready
Structured File System:
~/lab/logs/captures/scripts/investigations/screenshots/notes/
During my first full log capture, the captures/ folder filled faster than expected. I wrote a small Python script to rotate and compress .pcap files automatically, an early demonstration of workflow automation.
WSL2 Advantages:
- Minimal RAM overhead — even 1 GB+ packet captures run smoothly
- Near-native SSD performance
- Clean Windows integration
- Easy snapshotting:
wsl --export / wsl --import
Lab maintenance now takes minutes, leaving maximum time for actual security practice.
3. Practical Examples of Learning & Automation
- CloudTrail Automation: Parsing logs with Python revealed a misconfigured IAM role. Detection was automated across accounts using
boto3andjq. - Network Monitoring:
tcpdump + greptracked SSH attempts, generating timestamped alerts stored inlogs/. - Web Security Insights:
niktoscans against a lab web service showed common HTTP header probes, informing defensive scripting.
These exercises produce repeatable, verifiable outputs, ready for portfolio demonstration.
4. Reflection and Career Relevance
By freezing the lab at a minimum professional baseline, I:
- Verified tools under real-world constraints
- Practised structured SOC operations and cloud security automation
- Built a repeatable, portfolio-ready workflow
- Developed the habit of producing verifiable artefacts, not just installing tools
This lab demonstrates professional maturity, systems thinking, and deliberate progression — signals that SOC leads and cloud security managers value.
Outcome
- Consistent Blue Team operations and log analysis
- Defensive scripting and automation pipelines
- Cloud security monitoring and IAM auditing
- Verified, repeatable artefacts ready for GitHub and portfolio
The lab now provides a foundation for advanced SOC and cloud security practice, fully aligned with remote SOC roles across the UK and EU.
