Cybersecurity analyst with expertise in threat intelligence and security operations. Passionate about protecting digital assets and staying ahead of emerging threats. I regularly analyze malware, track threat actors, and contribute intelligence findings to the cybersecurity community.
- Threat Intelligence: Malware analysis, IOC identification, threat actor tracking
- Security Operations: SIEM implementation, alert triage, incident response
- Tools: Wireshark, Splunk, ELK Stack, Metasploit, Burp Suite, Nmap
- Defensive Security: Vulnerability assessment, penetration testing, security hardening
- Programming: Python, Bash scripting, PowerShell
- Google Cybersecurity Professional Certificate
- Cisco Certified Ethical Hacker
- Cisco Certified Jr. Cyber Analyst
- Trivy Web Scanner: User-friendly web interface for Trivy vulnerability scanner, providing dashboard for scan management and vulnerability visualization for containers, filesystems, and Git repositories.
- Active contributor on VirusTotal, sharing threat intelligence findings
- Honeypot Implementation for Threat Intelligence: Hosted a Honeypot System using TPot Honeypot Framework on Cloud running a Debian 12 OS.
- LinkedIn: Soheil Sheikh
"Security is a process, not a product." - Bruce Schneier