intelux.local · New York City, NY · Est. 2026
A portfolio-quality enterprise homelab built from scratch — VLAN-segmented network, live SIEM, GRC program, and active red team operations. Every failure documented. Every lesson earned.
INTELUX is a simulated enterprise security environment I designed to bridge the gap between academic theory and high-stakes production reality.
Why INTELUX exists:
Active Experience: Built to provide the "Year 1" hands-on experience that textbooks can't simulate.
Infrastructure Mastery: A living lab for applying A+, Network+, and Security+ concepts in a multi-tiered, hardware-to-application environment.
Full-Spectrum Simulation: I operate as the Architect (Network/SysAdmin), the Defender (SOC/GRC), and the Adversary (Red Team) to understand every angle of the attack surface.
My path to cybersecurity is driven by a commitment to technical excellence and professional discipline. Currently serving with the New York City Department of Sanitation (DSNY), my daytime schedule requires a non-traditional approach to gaining enterprise experience.
Rather than waiting for an opportunity, I built one.
INTELUX Systems, Inc. is the result of that drive. It is a "company" built from the ground up from physical hardware provisioning to VLAN segmentation and ISO 27001 compliance. It serves as my primary training ground while I complete my Cybersecurity degree at Westchester Community College and prepare for my CompTIA stack.
When I say I have experience with pfSense, Wazuh, or Proxmox, it isn't because I read the manual. it is because I built the company they run on.
| VLAN | Name | Subnet | Purpose |
|---|---|---|---|
| 10 | MGMT | 10.100.10.0/24 | Switch management, ADM-01, HV-01 |
| 20 | SERVICES | 10.100.20.0/24 | Docker stack, Wazuh, DC-01, WEB-01 |
| 30 | CLIENTS | 10.100.30.0/24 | Victim workstations, blue/red team exercises |
| 40 | PORTAL | 10.100.40.0/24 | Kiosk — Kill Chain B entry point |
| 50 | STAGING | 10.100.50.0/24 | Red team, isolated from all other VLANs |
| 60 | DMZ | 10.100.60.0/24 | Internet-facing services — WEB-01 (planned) |
Routing and inter-VLAN firewall policy enforced by pfSense CE 2.7.2 on INTELUX-HV-01.
| Device | Role | Hardware | Platform |
|---|---|---|---|
| INTELUX-HV-01 | Primary Hypervisor | Lenovo M920 Tower · i5-8500 · 16GB · 476GB NVMe | Proxmox VE 8 |
| INTELUX-CL-01 | Victim/Honeypot Host | Lenovo M910 Tower · i5-7500 · 16GB | Proxmox VE 8 |
| INTELUX-SRV-01 | Services Server | Apple Mac Mini 2014 · i5-4278U · 8GB | Ubuntu 24.04 / Docker |
| INTELUX-RED-01 | Red Team Host | Apple MacBook Pro 2012 · 8GB | Parrot OS (bare metal) |
| INTELUX-ADM-01 | Admin Workstation | Lenovo ThinkPad T14 · Ryzen 7 PRO 5850U · 16GB | Windows 11 Enterprise |
| INTELUX-SW-01 | Managed Switch | Netgear GS308E | GS308E Firmware |
| Tool | Category | Purpose |
|---|---|---|
| Wazuh v4.14.3 | SIEM / EDR | Endpoint detection, FIM, log aggregation, alerting |
| pfSense 2.7.2 | Firewall / Router | Perimeter firewall, VLAN routing, outbound NAT |
| Suricata | IDS/IPS | Network intrusion detection on WAN (EVE JSON → Wazuh) |
| Grafana + Prometheus | Monitoring | Infrastructure dashboards, node metrics |
| Pi-hole v6.4 | DNS | Internal DNS resolver, DHCP |
| Vaultwarden | Password Mgmt | Self-hosted credential vault |
| Caddy | Reverse Proxy | HTTPS termination, *.intelux.local subdomains |
| Tailscale | Remote Access | Subnet router advertising 10.100.0.0/16 |
| PhishTix | Portfolio Project | Custom Flask phishing analysis training tool |
| Parrot OS / Kali | Red Team | Penetration testing, OSINT, attack simulation |
CyberLab-Notes/
├── 01-Home Cyber Lab Architecture/ # VLAN design, hardware inventory, topology
├── 02-Isolated Zone/ # STAGING (VLAN 50) — red team infrastructure
├── 03-Trusted Zone/ # MGMT/SERVICES/CLIENTS — production zones
├── 04-Equipment/ # Hardware specs, SMART data, asset registry
├── 05-OS/ # OS configs, hardening notes
├── 06-VM/ # VM registry, Proxmox config
├── 07-Diagrams/ # Network topology diagrams
├── 08-Screenshots/ # Evidence artifacts
├── 09-Incidents & Lessons/ # Incident reports, post-mortems, lessons
├── 10-Professional Development/ # Cert roadmap, study notes, career target
├── 00-Templates/ # Incident report, change log, runbook templates
└── 99-Retired/ # Archived configs and deprecated docs
ISO 27001:2022 compliance matrix covering 28 Annex A controls across 4 domains. As of April 2026:
| Status | Controls | % |
|---|---|---|
| Implemented | 13 | ~46% |
| Partial | 10 | ~36% |
| Planned | 4 | ~14% |
| N/A | 1 | ~4% |
Key completed controls: A.5.26 (incident response), A.8.7 (malware protection), A.8.15 (logging), A.8.16 (monitoring), A.8.22 (network segregation).
Active risk register and change control documentation maintained per sprint.
Completed:
- Suricata WAN deployment with EVE JSON → Wazuh pipeline
- Vaultwarden MFA enforced
- Caddy reverse proxy fully configured (
*.intelux.local,tls_trust_poolWazuh CA trust) - GRC change control documents L-1, L-2, L-6
- DC-01 deployed (Windows Server 2022, 10.100.20.102, VLAN 20)
In Progress:
- East-west Docker isolation on SRV-01
- VLAN 60 DMZ — pfSense + WEB-01 at 10.100.60.10
- Kill Chain A — authorized pentest, RED-01 → WKS-03 (VLAN 50 → VLAN 30)
| Cert | Status | Target |
|---|---|---|
| Google Cybersecurity Certificate | In Progress | Spring 2026 |
| ISC² CC (Certified in Cybersecurity) | In Progress | Spring 2026 |
| CompTIA A+ Core 1 | Studying | May 2026 |
| CompTIA A+ Core 2 | Studying | May 2026 |
| CompTIA Network+ | Studying | May 2026 |
| CompTIA Security+ | Planned | Late 2026 |
| GIAC GCIH | Planned | 2027 |
| OSCP | Planned | 2027 |
| Document | Category | Status |
|---|---|---|
| INTELUX_Master_Asset_Inventory v1.11 | Overview | Complete |
| INTELUX_pfSense_VLAN_Runbook v1.1 | Network | Complete |
| INC-001_WindowsUpdate_FalsePositive | SOC / IR | Complete |
| INTELUX_ISO27001_Compliance_Matrix v1.0 | GRC | Complete |
| INTELUX_Company_Profile v1.1 | Overview | Complete |
| INTELUX_Risk_Register | GRC | In Progress |
| INTELUX_RedTeam_Rules_of_Engagement | Red Team | Planned |
| INTELUX_Network_Topology_Diagram | Network | Planned |
The full technical narrative — every OPNsense failure, every switch config bug, every hard-won lesson from February to April 2026 — is documented in 09-Incidents & Lessons/. If you want to understand how this environment was actually built, that's where to start.
INTELUX-CORP-001 · Classification: Public Portfolio · Owner: Raynard A. Porter (Lenox2Linux) · Last Updated: April 2026