Systems Engineer & B.S. Cybersecurity Student (WGU)
Building realistic blue-team home labs, phishing/OSINT workflows, and security tooling β then documenting the process in public.
For full case studies, screenshots, and write-ups, go here:
- π Portfolio: https://jtarkington-portfolio.netlify.app
GitHub is mainly where I keep the code/configs; the long-form write-ups live on the portfolio so I donβt have to maintain them in two places.
- CyberLab β My full cyber lab setup: virtualization host, networks, and workflow notes for day-to-day experimentation and practice.
- Home-Lab-Samba-AD-Wazuh β Enterprise-style home lab with Windows AD, Samba, and Wazuh SIEM for log collection, detection engineering, and blue-team practice.
- ViperKit β A Windows triage and persistence toolkit focused on incident response and endpoint analysis.
- Phishing & OSINT Projects
phishing-osint-orphanageatdβ OSINT + phishing-recon workflows and experiments.phishing-analysis-opencaseβ Structured analysis of phishing incidents and how to break them down like a case file.
Iβm using this GitHub mainly as a proof-of-work log for my security journey: home lab builds and tools that I actually use.
- Blue-team lab design: AD, logging, SIEM, endpoint security
- Phishing analysis, OSINT, and recon workflows
- Practical incident response / triage tools
- Turning lab work into shareable documentation and articles