Skip to content
View daniel-ploetzl's full-sized avatar

Highlights

  • Pro

Block or report daniel-ploetzl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
daniel-ploetzl/README.md

Daniel Plötzl

Junior Cybersecurity Analyst (SOC Analyst) candidate completing the Computer Software Engineering program at 42 Vienna (project-based, peer-to-peer), with a focus on Linux systems, networking, and security fundamentals.

Hands-on experience gained through system hardening projects and custom Bash tooling for authentication log analysis. Background in high-responsibility operational roles contributes strong analytical thinking, structured problem solving, and reliability under pressure.

🛠️ Tech Stack

Security & Operations

Linux Bash SSH Git

Languages

C C++ Python

Tools & Environment

Neovim Tmux Docker Ansible VirtualBox VMware

Technical Focus

  • Linux systems: processes, permissions, users, file systems, service behavior
  • Authentication & access control: SSH authentication, sudo usage, permission boundaries
  • Log analysis: parsing authentication logs, identifying failed logins and usage patterns
  • Networking fundamentals: TCP/IP, ports, client/server communication, exposure awareness
  • Scripting & automation: Bash scripting for system inspection and log parsing

Current Learning Focus

  • Security Operations Center (SOC) workflows and responsibilities
  • Analysis of authentication-related security events
  • Defensive security fundamentals and system hardening
  • Understanding system behavior and attack surface reduction

📁 Selected Projects

Authentication log analysis script

  • Failed SSH login analysis and brute-force detection
  • Credential stuffing pattern recognition
  • Perl regex-based log parsing
  • Time-based attack clustering

Bash Linux

Linux system hardening & security

  • Secure Linux VM setup
  • SSH hardening, user and privilege management
  • Firewall configuration and basic monitoring

Linux Bash

Unix shell implementation in C

  • Process control, pipes, redirections
  • Signal handling and environment management
  • Low-level understanding of system behaviour

C Linux

📍 Location

Vienna, Austria
Open to on-site and hybrid roles starting 2026


Contact: LinkedIndaniel@ploetzl.pro

Pinned Loading

  1. soc-auth-triage soc-auth-triage Public

    SSH authentication log analysis for security inspection and SOC triage

    Shell

  2. Born2BeRoot-hardening Born2BeRoot-hardening Public

    42 Vienna Born2BeRoot — Linux VM setup, SSH + firewall hardening, and monitoring script.

    Shell

  3. minishell minishell Public

    Custom Unix shell implementation in C focusing on processes, pipes, redirections, parsing, and signal handling.

    C 1