Banner Image

Skills

  • Antivirus
  • App Development
  • Checkpoint
  • Cisco ASA
  • Data Security
  • Encryption
  • Firewalls
  • Internet Security
  • Malware Removal
  • Mobile Security
  • Module Design
  • Nagios
  • Online Payments
  • Operations Management
  • Penetration Testing

Sign up or Log in to see more.

Services

  • Cybersecurity | SOC | Pentesting

    $25/hr Starting at $50 Ongoing

    Dedicated Resource

    I offer comprehensive cybersecurity services tailored to businesses, startups, and IT teams seeking to strengthen their digital defenses. With hands-on expertise across SOC operations, threat intelligence,...

    AntivirusApp DevelopmentCheckpointCisco ASAData Security

About

SOC Analyst | Threat Intelligence | DFIR | SIEM | Network & Web Security | Jr Penetration Tester | Security Engineer | CompTIA Pentest+ Certified

I am a cybersecurity professional with a strong foundation across SOC operations, threat intelligence, penetration testing, digital forensics, and security engineering. My journey reflects a structured progression through industry-recognized frameworks, hands-on labs, and advanced tooling, equipping me with both defensive and offensive security expertise.

SOC & Threat Intelligence:
My training began with SOC Level 1 fundamentals, where I mastered cyber defense frameworks such as the Pyramid of Pain, Cyber Kill Chain, Unified Kill Chain, Diamond Model, and MITRE ATT&CK. I gained practical exposure to threat intelligence tools including YARA, OpenCTI, and MISP, and developed the ability to analyze, triage, and respond to evolving adversary tactics.

Network & Endpoint Security:
I built strong expertise in network traffic analysis using Snort, Zeek, Wireshark, TShark, and NetworkMiner, enabling me to detect anomalies and investigate live attacks. On the endpoint side, I worked extensively with Sysinternals, Sysmon, Osquery, and Wazuh, strengthening my ability to monitor, correlate, and respond to host-based threats.

SIEM & Incident Response:
I am proficient in SIEM platforms such as ELK, Splunk, and Wazuh, with hands-on experience in log analysis, incident handling, and phishing investigations. My exposure to incident response frameworks and tools like TheHive, Autopsy, Redline, KAPE, Volatility, and Velociraptor sharpened my digital forensics and DFIR capabilities.

Offensive Security & Pentesting:
Expanding into offensive security, I trained as a Junior Penetration Tester, covering web application attacks (SQLi, XSS, SSRF, IDOR, command injection, race conditions), Burp Suite modules, and network reconnaissance with Nmap. I advanced into Metasploit exploitation, privilege escalation (Linux & Windows), and vulnerability research, building a strong red-team mindset.

Security Engineering & DevSecOps:
As a Security Engineer, I developed skills in secure network architecture, system hardening, Active Directory security, virtualization, and cloud security. I also explored software security practices including OWASP Top 10, API security, SSDLC, SAST, DAST, and DevSecOps pipelines, ensuring security is embedded across the development lifecycle.

Broader Cybersecurity Foundations:
My journey also includes Cybersecurity 101 and Pre-Security modules, covering Linux/Windows fundamentals, networking, cryptography, exploitation basics, and security solutions. This holistic foundation ensures I can adapt across blue team, red team, and engineering domains.

Certifications & Specialized Training:
I have pursued advanced certifications such as CompTIA Pentest+, where I refined skills in planning/scoping, reconnaissance, vulnerability scanning, exploitation, persistence, and lateral movement. Additionally, I completed Web Fundamentals and CTI modules (CISA JCDC Triage, Fusion & Analysis), further strengthening my ability to detect, analyze, and mitigat

Work Terms

I operate with a structured and professional approach to ensure clarity, efficiency, and trust in every engagement.

Hours of Operation:
Available Monday to Saturday, 9:00 AM – 7:00 PM (PKT).
Flexible scheduling for urgent projects or time-sensitive tasks.
Response time within 12–24 hours for standard inquiries.

Payment Terms:
All payments are processed securely through the platform.
Project-based or milestone-based payments depending on scope.
Clear deliverables defined before work begins to ensure transparency.
No hidden charges — revisions and adjustments are included as per agreed package.

Preferred Communication Style:
Primary communication via platform messaging for record-keeping and clarity.
Open to Zoom/Google Meet sessions for detailed discussions when required.
Communication style is professional, concise, and solution-focused, ensuring technical details are explained clearly and non-technical stakeholders can easily understand outcomes.

Collaboration & Commitments:
I prioritize clear requirements gathering before starting work to avoid scope creep.
Regular updates provided at agreed intervals (daily/weekly depending on project size).
Confidentiality and data integrity are strictly maintained in all engagements.
I value long-term professional relationships and aim to deliver work that builds trust and credibility.