TATE PANNAM
SOC Analyst | Blue Team | Threat Detection
tate@inksec.io
0491 600 241
inksec.io
Melbourne, AU — Remote-ready
SUMMARY

Cybersecurity practitioner transitioning into SOC operations with strong hands-on experience across threat detection, log analysis, incident triage, and MITRE ATT&CK mapping. Background in offensive security provides deep attacker-behaviour context that directly enhances detection accuracy and alert quality.

Currently completing Cert IV in Cyber Security (Victoria University) with a TAFE medal nomination. Actively documenting daily SOC investigations on inksec.io — 43 investigations, 72 YouTube walkthroughs, 41 unique MITRE techniques mapped across a public portfolio of 23 full lab writeups.

Two decades of IT support and systems experience across Australian telecoms, freelance digital operations, and small-business infrastructure. Clear communicator with proven ability to document, escalate, and work under pressure.

CERTIFICATIONS
Certification Issuer Status
CDSA – Certified Defensive Security Analyst Hack The Box Completed
SAL1 – SOC Analyst Level 1 TryHackMe Completed
SOC Analyst Learning Path LetsDefend / HTB Completed
AWS Academy Cloud Foundations AWS Academy Completed
CPTS – Certified Penetration Testing Specialist Hack The Box Completed
CWES – Certified Web Exploitation Specialist Hack The Box Completed
BSCP – Burp Suite Certified Practitioner PortSwigger Completed
eJPT – Junior Penetration Tester INE Completed
ICCA – INE Certified Cloud Associate INE Completed
BTL1 – Blue Team Level 1 Security Blue Team Planned
Cert IV in Cyber Security Victoria University In Progress
CORE COMPETENCIES

Detection & Monitoring

  • Alert triage & escalation workflows
  • Windows Event Log & Sysmon telemetry analysis
  • Linux audit log & auth log investigation
  • SIEM log ingestion, normalisation, correlation
  • DNS / HTTP / TLS traffic pattern analysis
  • Anomaly detection: process trees, persistence
  • MITRE ATT&CK technique mapping
  • Cloud logging fundamentals (CloudTrail, IAM)

Incident Response

  • Alert validation, IOC identification, containment
  • PowerShell abuse, scheduled tasks, run key analysis
  • Incident timeline construction & documentation
  • Memory forensics (Volatility 3)
  • Network forensics (Wireshark, Zeek, Suricata)
  • OSINT pivoting and IOC enrichment

Offensive Knowledge (Detection Context)

  • Web attack patterns: SQLi, LFI, RCE, IDOR, SSRF
  • AD paths: Kerberoasting, Pass-the-Hash, ESC1
  • Attacker tooling: Mimikatz, Impacket, PsExec
  • Privesc and post-exploitation behaviour patterns

Tooling

  • Splunk, Wazuh, Elastic SIEM
  • Wireshark, Zeek, Suricata, Snort
  • Volatility 3, Autopsy, FTK Imager, NetworkMiner
  • Sysmon + SwiftOnSecurity ruleset
  • Bash, Python (intermediate)
PORTFOLIO
inksec.io — Blue Team SOC Portfolio (public, updated daily)
43 Investigations
72 YouTube Videos
41 MITRE Techniques
23 Lab Writeups
PROFESSIONAL EXPERIENCE
Freelance IT & Digital Systems Consultant — Thailand
2011 – 2024
IT Helpdesk Support & Team Manager — Primus Telecom, Melbourne
2002 – 2010
IT Support Technician — Discriptus, Australia
1997 – 2002
EDUCATION
Qualification Institution Status
Cert IV in Cyber Security Victoria University In Progress ★ TAFE Medal Nomination
Cert IV in Information Technology Computer Power St Kilda Completed 2003