I'm a motivated and results-driven professional with a passion for cybersecurity, looking to contribute my expertise in a dynamic cybersecurity role. I aim to use my technical knowledge and problem-solving skills to safeguard digital assets against emerging threats.
Hi, I'm Shehzaad! I'm passionate about staying active and enjoy playing tennis and basketball whenever I get the chance. I also love working out and pushing myself to stay fit. In addition to my love for sports, I'm always eager to learn new languages—currently, I speak both Hindi and English. I'm always looking for new ways to challenge myself and grow, whether it's through physical activity or learning something new.
March 2025 – Present
August 2022 – Present
June 2019 – August 2022
June 2017 – May 2019
September 2016 - May 2017
Gained understanding of the relationship between Security Information and Event Management (SIEM) tools and security analysts.
Learned how SIEM tools aggregate, correlate, and analyze security event data.
Practiced using SIEM dashboards to detect potential security incidents and generate actionable alerts.
Explored the importance of log normalization and correlation for threat detection.
Hands-on experience with log queries to investigate security events.
Acquired knowledge of EDR tools used to monitor, detect, and respond to threats on endpoints.
Performed incident response tasks like isolating infected systems and collecting forensic data.
Understood the role of SOAR platforms in automating and orchestrating repetitive security processes.
Explored the integration of SOAR tools with SIEM, EDR, and other security platforms to enhance efficiency.
The Nmap module covered the fundamentals of network scanning, focusing on different scan types like TCP Connect, SYN, UDP, NULL, FIN, Xmas, and ICMP to identify open ports and services while evading firewalls and IDS.
It introduced the Nmap Scripting Engine (NSE) for advanced functionality, including vulnerability detection, service enumeration, and script customization.
The module provided hands-on experience with key Nmap switches and techniques for efficient network discovery and assessment.
Navigating Files
Navigating the Linux filesystem using commands like ls, cd, and pwd.
Using essential utilities: grep, cat, head, tail, and find.
Shell Operators
Leveraged operators like | (pipe) to chain commands (e.g., cat file.txt | grep keyword), > and >> for redirection to create or append to files, and && to execute conditional commands efficiently.
Configured Nessus Essentials for vulnerability scans on Windows 10 hosts.
Implemented vulnerability management and remediation processes. Discover, Prioritize, Assess, Report, Remediate, Verify.
Configured Windows Defender and Firewall for network protection and asset security.
Installed Wireshark, captured packet data, and analyzed network traffic for HTTP and HTTPS protocols.
Configured virtual environments and conducted malware analysis using tools like Procmon and Wireshark.
Conducted phishing simulation and awareness training to educate users on identifying and reporting phishing attacks.
Created and analyzed dump files to capture network traffic.