<

Shaik Abdul Rehman

✔ Hands-on SOC Projects | ✔ Real Investigation Reports

Cybersecurity | SOC Analyst | AI Security

⚡ SOC Analyst Overview

🛡 Threat Detection

Identifying suspicious activity using logs & intelligence tools.

🔍 OSINT Analysis

Investigating domains, IPs, and threats using real-world tools.

📊 Incident Response

Analyzing alerts and generating SOC-style reports.

⚙ Automation

Building AI agents to automate SOC workflows.

About Me

💥 From curiosity to capability — I don't just study cybersecurity, I practice it daily.

🎓 BCA student targeting an L1 SOC Analyst role, passionate about AI-driven threat detection and real-world SOC operations.

🛡️ Hands-on with Microsoft Defender XDR, SIEM investigations, Malware Traffic Analysis, OSINT Intelligence, Phishing Analysis, and Web Attack Investigation — validated through LetsDefend SOC skill badges.

🌍 Open to SOC Analyst internships and global opportunities in Saudi Arabia, UAE, and beyond.

Core Skills

Threat Detection

SIEM Investigation

Microsoft Defender XDR

OSINT Intelligence

Cybersecurity Skill Intelligence

🔍 Real-World Security Case Studies (Projects)

AI Security SOC Assistant – Agentic AI

Simulated automated SOC workflow using AI multi-agent architecture.

Problem: Manual SOC operations caused delays...

Result: Reduced manual workload and improved incident response speed.

Tools: Python, AI Agents, Log Analysis

🤖 View full AI SOC automation workflow

OSINT Threat Investigation

Conducted real-world threat validation using OSINT tools and intelligence correlation.

Problem: Identifying phishing infrastructure...

Result: Successfully identified malicious infrastructure and attack patterns.

Tools: VirusTotal, Urlscan.io, Whois, Threat Intelligence

🌐 Investigation Evidence Included in Report

🛠️ SOC Tools I Use

🔍 VirusTotal
🌐 Urlscan.io
📊 Microsoft Defender XDR
🛡️ SIEM (Splunk/ELK)
🕵️ OSINT Tools
🐍 Python
🐧 Linux
📡 Wireshark
🤖 AI Agents
☁️ Cloud Security

Cybersecurity Job Simulations

Tata IAM Simulation

Tata IAM Simulation

IAM Design & Access Control Analysis

View Report
Deloitte Log Analyst Simulation

Deloitte Log Analyst Simulation

Log Analysis & Threat Detection

View Report
AIG Shield Cybersecurity Simulation

AIG Shield Cybersecurity Simulation

Vulnerability Response & Ransomware Recovery

View Report

Additional Certifications

Gemini University Student Certificate

Gemini University Student Certificate

Advance Prompt Engineering UpGrad

Advance Prompt Engineering – UpGrad

LetsDefend SOC Skill Badges

Phishing Analysis

Email threat detection & phishing analysis

Malware Traffic Analysis

Network traffic analysis & packet inspection

Web Attack Investigation

Web attack detection & investigation (XSS, SQLi)

Cyber Incident Handler

Incident response & threat handling workflow

VirusTotal Analyst

Threat intelligence & file/URL analysis

SIEM 101

Log monitoring & SIEM alert analysis fundamentals

JWT Attacks and Detection

JWT token exploitation & authentication attack detection

Brute Force Investigation

Brute-force attack detection & authentication analysis

Malware Analyzer

Malware behavior analysis & threat identification

Network Cable

Networking fundamentals & connectivity concepts

AI Security Certifications

IBM Cybersecurity + Generative AI
Understanding Agentic AI
Google Generative AI
Google Vertex AI
Microsoft AI Security Fundamentals
Microsoft AI Security Controls
Kaggle × Google AI Agent Intensive

🚀 Ready to Contribute as a SOC Analyst

Actively seeking SOC Analyst opportunities to contribute to real-world security operations

📧 Email: cybershaik66@gmail.com

🔗 LinkedIn: linkedin.com/in/shaik-abdul-rehman

📍 Location: India (Open to Remote / Relocation)

🟢 Open to SOC Analyst / Cybersecurity Opportunities

© 2026 Shaik Cyber Portfolio