Abdelkrim Zouaki
SOC Analyst · Computer Security & Networking
Profile

SOC Analyst based in Montreal. Built a working detection stack — Suricata, Splunk, and Wazuh on a Raspberry Pi — before my first IT role. It runs against live traffic and produces real incidents. Specializing in alert triage, log correlation, and automation pipelines that surface what matters. Bilingual (French/English).

Experience
IT Support Technician
Alorica
Montreal, QC
  • Tier 1/2 support for internal workforce — Windows 10/11, Office 365, VPN, network peripherals. 25–35 tickets/day in a bilingual (FR/EN) environment.
  • Documented every incident with structured CRM notes for clean L2/L3 handoff and audit trail.
  • Maintained SLA compliance under sustained high ticket volume.
IT Support Intern
Groupe Cosior TI
Montreal, QC
  • Assisted with installation, configuration, and maintenance of servers and network equipment in enterprise environments.
  • Supported cybersecurity team with network traffic monitoring and vulnerability tracking.
  • Documented configurations and incidents to maintain accurate infrastructure records.
Operations (Retail & Warehouse)
SSENSE · IKEA · Dollarama · Couche-Tard
  • High-volume operations roles that built the reliability, process discipline, and composure under pressure that transfers directly to alert triage.
Education
DEC — Computer Security & Networking
Collège de Bois-de-Boulogne · Montreal, QC
Graduated 2025 · Core focus: network security, ethical hacking, incident response, system administration · Lab environments: Suricata, Splunk, pfSense, ELK Stack
Selected Projects
Home Mini-SOC Lab
Suricata IDS + Splunk SIEM + Wazuh HIDS on a Raspberry Pi, running against live network traffic. Produced real detections including a documented PowerShell fileless attack. Alert tuning reduced daily volume ~40% over 3 weeks.
Threat Intelligence Automation Bot
Python bot querying AbuseIPDB, VirusTotal, and OTX in parallel. Enriches IOCs, assigns risk scores, and generates structured reports. Integrated into IR workflow.
pfSense Firewall Lab
3-VLAN segmented lab (LAN/OPT1/OPT2) with site-to-site VPN, OpenVPN client access, per-segment DHCP/DNS, and Suricata in inline IDS mode.
Pi-hole DNS Security Layer
Network-wide DNS sinkhole on Raspberry Pi Zero 2 WH. Query logs piped into Splunk alongside Suricata alerts for cross-correlation.