// hint: try the konami code

PAPASOTIROPOULOS // node_07
SOC ONLINE SIEM ACTIVE OSINT FEED
UTC 00:00:00
ATH 00:00:00
37.9838°N · 23.7275°E
root@papasotiropoulos:~#

          
OPERATIONAL [ ATH · GR ] [ EST. 1999 ] [ eCPPT · SAL1 ]

Stavros Papasotiropoulos

Electrical Engineer · SOC L1 Analyst · OSINT Investigator · Educator

I monitor enterprise environments by day, hunt OSINT trails by instinct, design circuits because I was trained to, and teach because I always have. Scroll to fly — or click a glowing node to pull its file.

2025 SOC@ADACOM
0 CERTIFICATIONS
eCPPT CERTIFIED
0 TOOLS DEPLOYED
SCROLL // INITIATE FLIGHT · CLICK NODES // PULL FILES
MODULE_01 // ACTIVE

The Engineer.

Educational Electrical & Electronic Engineering — ASPAITE
SUBSYSTEM // hardware [ 01.A ]

A bachelor's foundation in circuit design, digital and analog systems, embedded systems, telecommunications and network fundamentals — earned at ASPAITE. As Back Office Engineer at Kapa Install I optimized technician scheduling, ran the e-shop infrastructure, and led R&D into emerging electrical systems.

  • AutoCAD
  • MATLAB
  • Embedded Sys
  • Energy Distribution
  • Circuit Design
  • Telecom
METRICS [ 01.B ]
2018-2025ASPAITE BSc
Kapa InstallBack Office Engineer
R&DEmerging electrical sys
MODULE_02 // ELEVATED

The Cyber
Investigator.

SOC L1 Analyst @ Adacom · eCPPT · TryHackMe
SUBSYSTEM // detection [ 02.A ]

I monitor client environments at Adacom, triage L1 alerts and execute incident playbooks to contain real threats. I built a functional SOC lab around Wazuh SIEM on Linux — log forwarding from endpoints, custom detection rules, brute-force and suspicious PowerShell investigation.

  • Wazuh SIEM
  • Wireshark
  • Nmap
  • Metasploit
  • Burp Suite
  • Hydra
  • Python
  • Incident Response
  • Threat Hunting
› eCPPT — INE › SOC L1 Analyst — TryHackMe › Jr Penetration Tester — TryHackMe › Complete Ethical Hacking — Udemy
OSINT // node graph [ 02.B · DRAG ]
↻ DRAG TO ROTATE
02.C // ARSENAL

Tools deployed in the field.

→ scroll to advance the rack
/01

Wazuh

SIEM core. Built a working SOC lab — endpoint log forwarding, detection rules, alert triage.

DEPLOYED
/02

Wireshark

Packet dissection for traffic analysis, anomaly hunting, and protocol-level forensics.

DEPLOYED
/03

Nmap

Network reconnaissance — host discovery, service fingerprinting, scripted scans.

DEPLOYED
/04

Metasploit

Exploitation framework — used during eCPPT prep and red-team simulations.

DEPLOYED
/05

Burp Suite

Web app proxy — intercept, replay, fuzz. Daily driver for application-layer testing.

DEPLOYED
/06

Hydra

Authentication brute-force — credential resilience testing in lab environments.

DEPLOYED
/07

Python

Automation glue. Custom parsers, log enrichers, OSINT scripts and SIEM integrations.

DEPLOYED
MODULE_03 // BROADCASTING

The Educator.

Tutor · Web Developer · Platform Builder
SUBSYSTEM // pedagogy [ 03.A ]

Since 2021 I've taught secondary, high-school and tertiary students in Electrical Engineering — in person, remotely, and at tutorial centers. I built and maintain a Greek educational platform to scale that work, and I bring the same teaching instinct into every technical handover and documentation sprint.

  • React.js
  • JavaScript
  • HTML / CSS
  • WordPress
  • UX Design
  • Curriculum Design
  • Meta Front-End
→ Visit the Education Platform
CHANNELS [ 03.B ]
2021-NOWPrivate tutoring
Bolt.hostEduPlatform GR
Core ConceptsWeb Developer
MODULE_04 // ESTABLISH COMMS

Open a channel.

Active for SOC, security engineering, threat-hunting and cyber-defence roles.

© 2026 — S. PAPASOTIROPOULOS BUILT WITH THREE.JS · GSAP · SCROLLTRIGGER END_OF_TRANSMISSION ▮