✔ Hands-on SOC Projects | ✔ Real Investigation Reports
Cybersecurity | SOC Analyst | AI Security
Identifying suspicious activity using logs & intelligence tools.
Investigating domains, IPs, and threats using real-world tools.
Analyzing alerts and generating SOC-style reports.
Building AI agents to automate SOC workflows.
💥 From curiosity to capability — I don't just study cybersecurity, I practice it daily.
🎓 BCA student targeting an L1 SOC Analyst role, passionate about AI-driven threat detection and real-world SOC operations.
🛡️ Hands-on with Microsoft Defender XDR, SIEM investigations, Malware Traffic Analysis, OSINT Intelligence, Phishing Analysis, and Web Attack Investigation — validated through LetsDefend SOC skill badges.
🌍 Open to SOC Analyst internships and global opportunities in Saudi Arabia, UAE, and beyond.
Threat Detection
SIEM Investigation
Microsoft Defender XDR
OSINT Intelligence
Simulated automated SOC workflow using AI multi-agent architecture.
Problem: Manual SOC operations caused delays in alert triage and incident response, increasing attacker dwell time.
Detection Logic: AI agents analyzed log patterns and correlated multiple low-severity alerts into high-confidence threat chains — catching subtle lateral movement that single-rule SIEM alerts would miss.
Playbook: Alert Triggered → AI Triage Agent → Log Correlation → Severity Scoring → Auto-Escalation or Close
Business Impact: Reduced manual triage workload by ~60%, cutting mean time to respond (MTTR) and limiting potential breach exposure for the organization.
Tools: Python, AI Agents, Log Analysis, SIEM
🤖 View full AI SOC automation workflow
Conducted real-world threat validation using OSINT tools and intelligence correlation.
Problem: Identifying active phishing infrastructure before it targets users — preventing credential theft and data loss.
Detection Logic: Cross-correlated domain registration data, IP reputation scores, and SSL certificate history across VirusTotal, Urlscan.io, and Whois — identifying 3 confirmed malicious IOCs linked to a phishing campaign.
Playbook: Suspicious URL Reported → OSINT Scan → IOC Correlation → Threat Confirmed → Block & Document → Stakeholder Report
Business Impact: Early identification of phishing infrastructure prevented potential credential compromise — protecting user accounts and reducing risk of unauthorized access to internal systems.
Tools: VirusTotal, Urlscan.io, Whois, Threat Intelligence Platforms
🌐 Investigation Evidence Included in Report
Gemini University Student Certificate
Advance Prompt Engineering – UpGrad
SIEM 101
Log monitoring & SIEM alert analysis fundamentals
Log Analysis With Sysmon
Windows event log analysis using Sysmon
Malware Traffic Analysis
Network traffic analysis & packet inspection
PCAP Analysis
Network packet capture analysis using Wireshark
Network Cable
Networking fundamentals & connectivity concepts
VirusTotal Analyst
Threat intelligence & file/URL analysis
Threat Intelligence Feeds and Platforms
Leveraging threat intel feeds & platforms for proactive defense
Malware Analyzer
Malware behavior analysis & threat identification
Detector
Alert investigation & IOC detection across endpoint and network logs
Web Attack Investigation
Web attack detection & investigation (XSS, SQLi)
JWT Attacks and Detection
JWT token exploitation & authentication attack detection
Brute Force Investigation
Brute-force attack detection & authentication analysis
Phishing Analysis
Email threat detection & phishing analysis
Cyber Incident Handler
Incident response & threat handling workflow
Actively seeking SOC Analyst opportunities to contribute to real-world security operations
📧 Email: cybershaik66@gmail.com
🔗 LinkedIn: linkedin.com/in/shaik-abdul-rehman
📍 Location: India (Open to Remote / Relocation – Saudi Arabia / UAE)
🟢 Open to SOC Analyst / Cybersecurity Opportunities