✔ Hands-on SOC Projects | ✔ Real Investigation Reports
Cybersecurity | SOC Analyst | AI Security
Identifying suspicious activity using logs & intelligence tools.
Investigating domains, IPs, and threats using real-world tools.
Analyzing alerts and generating SOC-style reports.
Building AI agents to automate SOC workflows.
💥 From curiosity to capability — I don't just study cybersecurity, I practice it daily.
🎓 BCA student targeting an L1 SOC Analyst role, passionate about AI-driven threat detection and real-world SOC operations.
🛡️ Hands-on with Microsoft Defender XDR, SIEM investigations, Malware Traffic Analysis, OSINT Intelligence, Phishing Analysis, and Web Attack Investigation — validated through LetsDefend SOC skill badges.
🌍 Open to SOC Analyst internships and global opportunities in Saudi Arabia, UAE, and beyond.
Threat Detection
SIEM Investigation
Microsoft Defender XDR
OSINT Intelligence
Simulated automated SOC workflow using AI multi-agent architecture.
Problem: Manual SOC operations caused delays...
Result: Reduced manual workload and improved incident response speed.
Tools: Python, AI Agents, Log Analysis
🤖 View full AI SOC automation workflow
Conducted real-world threat validation using OSINT tools and intelligence correlation.
Problem: Identifying phishing infrastructure...
Result: Successfully identified malicious infrastructure and attack patterns.
Tools: VirusTotal, Urlscan.io, Whois, Threat Intelligence
🌐 Investigation Evidence Included in Report
Gemini University Student Certificate
Advance Prompt Engineering – UpGrad
Phishing Analysis
Email threat detection & phishing analysis
Malware Traffic Analysis
Network traffic analysis & packet inspection
Web Attack Investigation
Web attack detection & investigation (XSS, SQLi)
Cyber Incident Handler
Incident response & threat handling workflow
VirusTotal Analyst
Threat intelligence & file/URL analysis
SIEM 101
Log monitoring & SIEM alert analysis fundamentals
JWT Attacks and Detection
JWT token exploitation & authentication attack detection
Brute Force Investigation
Brute-force attack detection & authentication analysis
Malware Analyzer
Malware behavior analysis & threat identification
Network Cable
Networking fundamentals & connectivity concepts
Actively seeking SOC Analyst opportunities to contribute to real-world security operations
📧 Email: cybershaik66@gmail.com
🔗 LinkedIn: linkedin.com/in/shaik-abdul-rehman
📍 Location: India (Open to Remote / Relocation)
🟢 Open to SOC Analyst / Cybersecurity Opportunities