ASPIRING SOC ANALYST · INCIDENT RESPONSE · PENETRATION TESTING
Cybersecurity postgraduate with hands-on experience in Active Directory attack techniques, OWASP Top 10 vulnerabilities, and penetration testing methodologies. Building skills through real labs, CTFs, and continuous research.
Offensive security tooling for full-spectrum assessments across network, web, and AD environments.
Advanced AD attack techniques and identity/access management abuse in enterprise environments.
Deep protocol knowledge and traffic analysis across modern infrastructure layers.
Security event correlation, threat detection pipelines, and SOC operations experience.
IAM misconfiguration analysis and cloud-native security assessments.
Automating enumeration, detection, and reporting pipelines to accelerate security operations.
Designed and deployed a multi-machine Active Directory environment in VMware simulating enterprise domain infrastructure. Executed advanced attack techniques including Kerberoasting, Pass-the-Hash, DCSync, and lateral movement. All techniques mapped to MITRE ATT&CK. Developed PowerShell automation scripts and produced detailed remediation reports.
Built a security monitoring system integrating Snort IDS for network traffic analysis and Splunk for log correlation. Implemented detection rules for brute-force, port scans, and anomalous traffic patterns. Automated daily incident report generation — reduced manual triage time by 60%.
Configured DVWA and OWASP Juice Shop in an isolated environment. Identified and exploited OWASP Top 10 vulnerabilities including SQLi, XSS, Broken Auth, IDOR, and CSRF using Burp Suite. Produced professional pentest reports with CVSS scoring, PoC documentation, and actionable remediation steps.
Looking for a Cybersecurity / VAPT internship where I can apply practical lab skills in real-world security assessments. Let's talk.