FOOTBALL, CRICKET, SWIMMING
Cybersecurity professional pursuing a Master's in Cybersecurity at Macquarie University. Proficient in penetration testing, vulnerability assessment, threat detection, and response. Committed to strengthening organizational security by identifying and mitigating vulnerabilities. Skilled in utilizing tools and techniques to protect systems and data while staying up-to-date with the latest developments in cybersecurity. Actively seeking full-time opportunities to apply expertise in safeguarding digital assets and mitigating security risks, contributing to the resilience and security of organizations.
Splunk (SIEM tool for log analysis and threat detection)
Vulnerability assessment and Pen-testing
Cyber threat intelligence ( Cisco Talos intelligence, Virus Total)
Network Security (firewalls, VPNs, and intrusion detection systems)
Governance, Risk and Compliance (GRC)
SOCLevel 1: Foundational knowledge in security operations, threat detection, incident response, log analysis, and the use of security tools like Splunk, Wireshark, and Windows event logs.
Google Cybersecurity Professional Certificate: Comprehensive introduction to cybersecurity concepts, tools like Linux, Python, SIEM, and incident response techniques.
Network Defense: Understanding strategies and tools to protect the network infrastructure against cyber threats.
Endpoint security: Techniques to secure end-user devices against malware, unauthorized access, and vulnerabilities
FOOTBALL, CRICKET, SWIMMING
SOCLevel 1: Foundational knowledge in security operations, threat detection, incident response, log analysis, and the use of security tools like Splunk, Wireshark, and Windows event logs.
Google Cybersecurity Professional Certificate: Comprehensive introduction to cybersecurity concepts, tools like Linux, Python, SIEM, and incident response techniques.
Network Defense: Understanding strategies and tools to protect the network infrastructure against cyber threats.
Endpoint security: Techniques to secure end-user devices against malware, unauthorized access, and vulnerabilities