
Hello, and welcome to my site!
I’m Victor Coil, a cybersecurity professional focused on Security Operations and detection engineering.
Education: I completed the SANS Cyber Academy (July 2025–February 2026), earning the GCIH, GSEC, and GFACT certifications, and hold a B.S. in Cybersecurity (Cum Laude) from DePaul University and an A.S. in Computer Science from Waubonsee Community College.
Certifications: GCIH · GSEC · GFACT · CySA+ · SAL1 · CCNA · Security+ · GIAC Advisory Board Member
Competitions: National Cyber League, Top 3% (Team) · Hivestorm · Huntress CTF · PicoCTF
My goal is to operate as a high-performing Blue Teamer, one who doesn’t just respond to alerts but understands attacker behavior deeply enough to anticipate it.
I’ve built that foundation hands-on: designing a cloud SOC pipeline integrating Wazuh, Shuffle, TheHive, and MISP; conducting manual malware analysis with IDA Pro, OllyDbg, and Cutter on FlareVM/REMnux; deploying honeypots to study real-world brute-force and RDP attack patterns; and building detection logic against OWASP Top 10 attack categories using Snort in an Active Directory environment.
This site documents that work, not as a showcase, but as a technical record. Every project page reflects a real problem I worked through, from initial setup to lessons learned. If you’re a recruiter, hiring manager, or fellow practitioner, I hope it gives you an accurate picture of how I think and operate.
Click on the titles to access the lab Documentation or GitHub.
These are the Python projects on my GitHub
These are the project that I plan on putting together next
The CVE Number has a link to the actual report created by MITRE while the Name of the Machine/Room is a link to my writeup.
These writeups help me work on my reporting, keeping my technical skills sharp, developing the mindset of an attacker which is crucial for a defender, and being educated on vulnerabilities and exploits used in the past.
Vulnerability: CVE-2015-3306 “mod_copy module”
Tags: Nmap Scan, SMB enumeration, FTP exploit, SSH, and SUID escalation
Vulnerability: CVE-2007-2447 “’Username’ map script’ Command Execution”
Tags: Nmap Scan, SMB exploit/escalation