Polytechnic Cybersecurity Student | SOC Analyst · IR Specialist · Penetration Tester
Building a strong foundation in networking, threat detection, digital forensics, and system security. Passionate about hands-on security monitoring and bridging defensive operations with offensive tactics to systematically mitigate threats.
🎯 Objective: Aspiring Security Operations Center (SOC) Analyst and IR Specialist actively seeking an internship opportunity. Focused on leveraging open-source SIEM tools, threat intelligence, and automation to detect, investigate, and respond to cyber threats in real time.
Certified Professional Penetration Tester (eCPPT)
- Full-Spectrum Threat Emulation: Executing complex, multi-stage penetration tests mimicking real-world APT tactics.
- Infrastructure & Web Exploitation: Compromising hardened network perimeters and exploiting intricate web application logic.
- Enterprise Active Directory Exploitation: Systematically dismantling domain security, abusing Kerberos authentication, and executing complete domain privilege escalation.
- Advanced Post-Exploitation: Mastering stealthy lateral movement, deep network pivoting, and complex privilege escalation vectors.
- Vulnerability Weaponization: Engineering custom exploits, buffer overflows, and developing payloads to bypass modern defenses.
INE Certified Incident Responder (eCIR)
- Threat Detection & SIEM Operations
- Multi-Source Log Correlation and IOC Analysis
- Endpoint Telemetry and Audit Log Investigation
- Persistence and Privilege Escalation Detection
- Network Traffic & PCAP Analysis (C2, Lateral Movement)
- Digital Forensics and Evidence-Based Analysis
- Malware and Suspicious File Artifact Review
- Threat Intelligence Mapping (MITRE ATT&CK)
- Incident Reporting and Communication of Findings
ISC2 Certified in Cybersecurity (CC)
- Access Control & Security Principles
- Security Operations & Incident Response Fundamentals
- Network Security Concepts
- Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Huawei HCIA-DATACOM
- TCP/IP Networking, VLANs, and Subnetting
- Routing Configuration (OSPF, RIP, Static Routing)
- Access Control Lists (ACLs) and Traffic Filtering
- Firewall, VPN Fundamentals, MPLS, SD-WAN, and WAN Technologies
- Dual-Stack Deployment (IPv4 & IPv6) & Secure Connectivity
- Python Basics for Network Automation & SDN Concepts
00000000 54 48 45 20 51 55 45 53 54 49 4f 4e 20 49 53 20 |THE QUESTION IS |
00000010 34 32 20 2d 20 43 41 4e 20 59 4f 55 20 46 49 4e |42 - CAN YOU FIN|
00000020 44 20 54 48 45 20 41 4e 53 57 45 52 3f 20 4d 59 |D THE ANSWER? MY|
00000030 53 54 45 52 59 20 43 4f 44 45 20 49 53 3a 20 58 |STERY CODE IS: X|
00000040 30 52 20 34 32 20 2d 20 44 45 43 4f 44 45 3a 20 |0R 42 - DECODE: |
00000050 56 6c 71 63 6c 71 6c 71 6b 62 6f 63 20 47 62 62 |Vlqclqlqkboc Gbb|
00000060 62 61 71 20 43 6c 6a 62 61 63 6a 6a 20 34 32 20 |baq Cljbacjaaj 42 |
00000070 2d 20 41 73 68 77 6c 6a 6c 61 6c 7a 6a 63 20 47 |- Ashwljlalzjc G|
00000080 6c 61 7a 6a 63 20 34 32 2e 00 00 00 00 00 00 00 |lazjc 42........|
chmod +x ./ali-alaradi — now executing.