Build intuition in programming, Linux, networking, tooling, and reproducible workflows. This is the layer that makes later telemetry and security work grounded instead of decorative.
Building from systems fundamentals toward monitoring, detection, and security engineering.
I am stacknil, an early-career builder shaping a public portfolio around one clear motion: systems work creates operational intuition, telemetry work turns that intuition into observable signals, and security engineering applies those signals to detection and response.
A portfolio arranged as a pipeline, not a pile.
Convert raw events into structured signals: timelines, baselines, windows, rules, and alerts. This is where analysis becomes operational and easier to verify.
Apply telemetry habits to monitoring, detections, safe writeups, and security-oriented tooling. The long-term goal is engineering work that is observable, testable, and useful in real workflows.
Clear direction, sharper portfolio signal, public artifacts with method behind them, and a narrative that makes monitoring and security intent obvious without overselling maturity.
-
Coherent sequenceEach repo should reinforce the same movement rather than compete for identity.
-
Reproducibility over hypeSmall demos, deterministic outputs, visible constraints, and testable workflows.
-
Operational languageSignals, windows, alerts, monitoring surfaces, hardening, and detection logic.
Current themes and operating areas.
Programming fundamentals, Linux comfort, networking basics, tooling discipline, and the habit of making work reproducible enough to inspect and extend.
Event normalization, time windows, rule logic, alert thresholds, timeline rendering, and small experiments that make signal behavior easier to reason about.
Think in monitored surfaces, suspicious changes, triage context, and explainable outputs rather than isolated scripts with no operational story.
README structure, sanitized notes, controlled terminology, and method-focused public artifacts that show judgment as well as technical curiosity.
What I am building toward.
A tighter public record that shows I can work from systems understanding into telemetry pipelines, then turn that telemetry into alerts, detections, and safer engineering decisions.
-
Monitoring engineeringBuild comfort with metrics, logs, service behavior, dashboards, and failure signals.
-
Detection engineeringDesign and tune rules, windows, baselines, and timelines that support investigation.
-
Security engineeringStrengthen tooling, governance, and instrumentation habits that make systems safer to operate.
Representative repositories with one clear lead project.
A four-demo flagship repo built around deterministic, reviewable workflows: windowed telemetry analytics, constrained AI-assisted case drafting, rule-hit dedup and cooldown behavior, and bounded config-change investigation.
This is the strongest public project on the page because each demo stays local, file-based, and inspectable. The only LLM usage is explicit, schema-constrained, and non-autonomous.
A lightweight repository scanner that treats codebases as monitored surfaces rather than static folders. The sharper signal here is engineering hygiene: deterministic checks, packaging discipline, CI release flow, and automation habits that make repository state easier to inspect and trust.
A sanitized public security notebook where the hard part is judgment, not just note-taking. The repo emphasizes taxonomy, redaction boundaries, terminology control, and public-safe reporting so that security learning becomes reusable without becoming reckless.
These repository axes remain part of the larger architecture even when they are not all equally public yet. Their job is to support the same story: stronger fundamentals, better telemetry intuition, and more credible security-oriented engineering over time.
Public writing should explain how the engineering works.
-
telemetry-lab / v0.6.0 release and reviewer packsThe current milestone for the four-demo repo, plus small reviewer-pack artifacts for the constrained AI-assisted detection and config-change investigation paths.
-
sec-writeups-public / SOC FundamentalsA public-safe blue-team note on SOC roles, triage flow, alert meaning, and why context decides whether a detection is actually suspicious.
-
Systems / workflow noteA short piece on repo governance, testing, automation, or reproducible tooling as an engineering habit.
Keep the resume block simple.
Publish a single PDF in this site when ready. Recommended path: /assets/stacknil-cv.pdf.
Minimal, deliberate, and low-noise.
-
GitHub
-
Site
-
Email