IMG-20260219-WA0010

Who I Am

My name is Jorge Tasse. I’m a cybersecurity analyst focused on Blue Team security operations, including incident response, networking, and threat detection.

My background combines formal education with constant hands-on practice. Most of my learning happens by building, operating, and troubleshooting real SOC lab environments. I spend much of my time developing and refining these environments to prepare for real analyst roles while continuing to build enterprise-level skills.

I hold a Cybersecurity Analyst Diploma along with industry certifications, and I actively expand my knowledge through labs, simulations, and structured projects that mirror real security environments.

Why I Created the CyberFores Home Lab

I created the CyberFores Home Lab to go beyond resumes and certifications.

CyberFores represents:

  • A place where I demonstrate practical SOC skills that employers expect but don’t always get to see clearly documented

  • An environment where attacks, detections, misconfigurations, and responses are intentionally created, broken, fixed, and analyzed

  • A way to translate hands-on security work into clear explanations, diagrams, and case studies that reflect real analyst thinking

Instead of simply describing tools and concepts, I deploy them. I break things, fix them, and make them work together the way they do in real environments.

Certifications and Education

  • Cybersecurity Analyst Diploma – ABM College (Toronto, Canada)
  • CompTIA A+ Certified IT Professional

  • ISC² Certified in Cybersecurity (CC)

  • IBM Soft Skills for Professionals

  • CompTIA Security+ (In Progress)

What Cyberfores Represents

The CyberFores Lab is built on a multi-machine, segmented home SOC environment designed to resemble real enterprise network architecture.

Inside the lab, I regularly work with:

  • pfSense as a perimeter firewall

  • Wazuh as a SIEM platform to analyze logs and validate alerts

  • Zabbix to monitor systems and infrastructure

I operate across Windows workstations and servers, as well as Linux systems including Ubuntu, Kali, and Rocky Linux.

This lab is not static. It evolves continuously as I introduce new tools, architectures, and scenarios.

Why Hire Me

I have built a SOC-style environment where firewalls, endpoints, servers, monitoring tools, and simulated threats interact the way they do in real networks. That experience gives me a practical understanding of how security actually works — not just how it’s described.

CyberFores will continue to grow with:

  • Advanced SOC detection scenarios

  • Real-world case studies

  • Automation, AI, and machine-learning-driven monitoring

  • SOC maturity and improvement projects

Everything is documented, structured, and continuously improved.

If you’re looking for someone who learns fast, thinks critically, and understands SOC workflows, CyberFores is my proof.

You’re not just hiring me for today’s role — you’re hiring someone built to grow into future security challenges.