MASON JETER

SOC Analyst & Software Engineer

CS & Cybersecurity student at Western Governors University. Passionate about building secure, intuitive, and innovative technology solutions that solve real-world problems. Constantly developing skills across academic projects, hands-on labs, and professional experience.

root@mason-jeter:~
$whoami
mason_jeter — SOC Analyst / Software Engineer
$cat status.txt
AVAILABLE FOR HIRE ✓
$cat certs.txt
CompTIA Security+ | A+ | Network+
Google Cybersecurity | AZ-900 | SC-900
$ls ./projects
homelab/  honeypot/  python-siem/
$./run portfolio.sh
SUCCESS — Welcome. Glad you're here.
$
Who I Am

ABOUT ME

30+
Projects
3
Years in CS
6
Certs Earned
Drive

Hello! I'm Mason Jeter, a Computer Science and Cybersecurity student at Western Governors University and a Cybersecurity Intern.

I'm passionate about building secure, intuitive, and innovative technology solutions that solve real-world problems. Whether through academic projects, hands-on labs, or professional experience, I'm constantly developing my skills to create systems that are both functional and secure.

Glad you're here!

Security+ A+ Network+ Google Cyber AZ-900 SC-900
ACCESS GRANTED. WELCOME.
What I've Built

MY PROJECTS

01 HOMELAB
Self-Initiated Cybersecurity Homelab

Designed and built a full enterprise-simulated environment using virtual machines running Windows and Linux. Configured Active Directory, network segmentation, firewall rules, user access controls, and simulated common attack scenarios to test detection and response capabilities. Monitored traffic with Wireshark and conducted vulnerability scans and basic penetration testing exercises.

VirtualBox / VMware Windows Server Active Directory Wireshark Network Segmentation Pen Testing
VIEW ON GITHUB →
02 THREAT INTEL
Honeypot Deployment

Deployed a honeypot in a controlled lab environment to attract and analyze malicious traffic. Simulated vulnerable SSH and HTTP services, captured unauthorized access attempts, and identified brute-force patterns, automated bot activity, and geographic IP sources. Documented attack frequency and common exploitation techniques using behavioral log analysis.

Cowrie / Dionaea SSH Simulation Log Analysis Threat Intel IP Geolocation IOC Detection
VIEW ON GITHUB →
03 PYTHON / DETECTION
Python-Based SIEM

Developed a custom Security Information and Event Management system using Python to aggregate, parse, and analyze security logs. Implemented rule-based detection logic, automated alerting for predefined security triggers, and normalized log structures for readability. Tested detection capabilities against simulated attacks from the homelab environment.

Python Log Parsing Regex Automated Alerting Detection Engineering SIEM Logic
VIEW ON GITHUB →
Capabilities

MY SKILLS

Languages 7 TOOLS
PythonPython
CC
C++C++
SQLSQL
BashBash
JavaScriptJavaScript
TypeScriptTypeScript
🖥PowerShell
🛡 Security Tools 6 TOOLS
KaliKali Linux
🐍Metasploit
🕷Burp Suite
📡Nmap
🔬Wireshark
🔍Nessus
🔎Qualys
📊 SIEM & Monitoring 2 PLATFORMS
SplunkSplunk
ElasticElastic Stack
Cloud & Infrastructure 4 PLATFORMS
AWSAWS Security
AzureAzure Sentinel
DockerDocker
KubernetesKubernetes
💻 Operating Systems 3 OS
WindowsWindows
UbuntuUbuntu
macOSmacOS
📋 Frameworks & Standards 5 FRAMEWORKS
🔟OWASP Top 10
MITRE ATT&CK
🏛NIST CSF
🔒CIS Controls
📜ISO 27001
Let's Talk

GET IN TOUCH

Have a project in mind, want to collaborate, or just want to connect? Transmit a message — I'll get back to you ASAP.