Skip to content
View samadali786's full-sized avatar

Block or report samadali786

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
samadali786/README.md

Hi there below is summary about me and the certifications and projects that I worked on👋

-🙂 About me ...

  • The University of Texas at San Antonio Computer Science alumni transitioned into Cybersecurity and
    have previous experience working as an Associate Software Engineer, with a good understanding of
    working with Java technology, in a Front-End and Back-End environment.

  • I started my Cybersecurity journey by achieving Google Cybersecurity and CompTIA Security+ CE
    certifications. In this certification program, I learned how to identify Social Engineering attacks, how
    to identify threats and vulnerabilities and how to use the incident response process using the NIST
    Cybersecurity framework (RMF, CSF). After getting those certificates, I developed my interest in
    Blue Team roles as SOC Analyst and Security Analyst to get a more in-depth understanding of the
    SOC Analyst roles, so I completed Let's Defend Blue Team training paths (SOC Analyst, Malware
    Analysis, SIEM Engineering, and Incident Responder). These paths practically trained me in how to
    perform malware analysis (static and dynamic) using a sandbox environment, how to use different
    CLI and GUI tools for identifying IoC and malicious code, and how to solve alert tickets in an
    interactive SIEM dashboard similar to the one that is used in the SOC Analyst work environment. I
    also worked on some projects to get a better understanding of using these tools.

  • These skills helped me to achieve my CompTIA CySA+ CE certification. In this certification
    program, I learned how to manage vulnerabilities using a proactive approach, how to read endpoints,
    network and application logs, and how to correlate them in SIEM, as well as how to manage incident
    and response processes, and how to perform reporting and communication of different types of
    vulnerabilities and incidents using reactive approach.
  • 🔭 Certifications...

     • CompTIA CySA+ certified.
     • Let's defend (SIEM Engineer Path).
     • Let's defend (Incident Responder Path).
     • Let's defend (Malware Analysis Skill Path).
     • Let's defend (SOC Analyst Learning Path).
     • CompTIA Security+ certified.
     • Google Cybersecurity certification.
    
  • 🔭 Projects..

      • How to use Burp Suite with DVWA Vulnerable Web Application (Burp Suite, DVWA vulnerable web application).
      • Reverse TCP shell between Attacker and Target Virtual Machines for Malware Analysis (Nmap, Metasploit Framework).
      • Vulnerability Management using Nessus vulnerability scanner (Nessus). 
      • Traffic Analysis of Malicious file downloaded from Fake Software Site (Wireshark, PowerShell).
      • Network Packet Analysis with Wireshark and DeepSeek AI (Wireshark, DeepSeek AI).
      • Decrypt and Analyze malicious HTTPS and TLS network traffic in Wireshark (Wireshark, VirusTotal, Malware Analysis).
      • Static and Dynamic Malware Analysis project (using virtual sandbox environment).
      • OWASP WebGoat Project (open-source securing web application project by OWASP).
      • Google Cybersecurity certification portfolio (Incident Report Analysis using NIST framework, using Wireshark for Network Packet Analyzing, Linux CLI for (file management, and permissions), Incident 
        handle Journal, and how to use playbooks in security incidents).
      • Secure Messaging App team project creating User Interface (Java, MVC, Android Studio).
    
  • 🌱 Currently learning ...

      • Currently I am learning more in-depth understanding of Cybersecurity frameworks, static and dynamic malware analysis, Network security, log analysis and mangement in SIEM, vulnerability management, and web application security. 
    
  • 📫 How to reach me: ...

      • Email: samadali230@gmail.com
      • LinkedIn: https://www.linkedin.com/in/samad-ali
    

Pinned Loading

  1. Google_Cybersecurity_Portfolio Google_Cybersecurity_Portfolio Public

    Google Cybersecurity Program

  2. Cybersecurity-Projects Cybersecurity-Projects Public

  3. SecureMessagingAppLayout SecureMessagingAppLayout Public

    Java

  4. Case-Study-Cyclistic-Bike-Share-Data-Set- Case-Study-Cyclistic-Bike-Share-Data-Set- Public

    Googles Professional Certificate Case Study for Capstone Project for Cyclistic Bike Share Data Set

    R

  5. BreakOutGame_Project BreakOutGame_Project Public