-🙂 About me ...
• The University of Texas at San Antonio Computer Science alumni transitioned into Cybersecurity and
have previous experience working as an Associate Software Engineer, with a good understanding of
working with Java technology, in a Front-End and Back-End environment.
• I started my Cybersecurity journey by achieving Google Cybersecurity and CompTIA Security+ CE
certifications. In this certification program, I learned how to identify Social Engineering attacks, how
to identify threats and vulnerabilities and how to use the incident response process using the NIST
Cybersecurity framework (RMF, CSF). After getting those certificates, I developed my interest in
Blue Team roles as SOC Analyst and Security Analyst to get a more in-depth understanding of the
SOC Analyst roles, so I completed Let's Defend Blue Team training paths (SOC Analyst, Malware
Analysis, SIEM Engineering, and Incident Responder). These paths practically trained me in how to
perform malware analysis (static and dynamic) using a sandbox environment, how to use different
CLI and GUI tools for identifying IoC and malicious code, and how to solve alert tickets in an
interactive SIEM dashboard similar to the one that is used in the SOC Analyst work environment. I
also worked on some projects to get a better understanding of using these tools.
• These skills helped me to achieve my CompTIA CySA+ CE certification. In this certification
program, I learned how to manage vulnerabilities using a proactive approach, how to read endpoints,
network and application logs, and how to correlate them in SIEM, as well as how to manage incident
and response processes, and how to perform reporting and communication of different types of
vulnerabilities and incidents using reactive approach.
-
🔭 Certifications...
• CompTIA CySA+ certified. • Let's defend (SIEM Engineer Path). • Let's defend (Incident Responder Path). • Let's defend (Malware Analysis Skill Path). • Let's defend (SOC Analyst Learning Path). • CompTIA Security+ certified. • Google Cybersecurity certification. -
🔭 Projects..
• How to use Burp Suite with DVWA Vulnerable Web Application (Burp Suite, DVWA vulnerable web application). • Reverse TCP shell between Attacker and Target Virtual Machines for Malware Analysis (Nmap, Metasploit Framework). • Vulnerability Management using Nessus vulnerability scanner (Nessus). • Traffic Analysis of Malicious file downloaded from Fake Software Site (Wireshark, PowerShell). • Network Packet Analysis with Wireshark and DeepSeek AI (Wireshark, DeepSeek AI). • Decrypt and Analyze malicious HTTPS and TLS network traffic in Wireshark (Wireshark, VirusTotal, Malware Analysis). • Static and Dynamic Malware Analysis project (using virtual sandbox environment). • OWASP WebGoat Project (open-source securing web application project by OWASP). • Google Cybersecurity certification portfolio (Incident Report Analysis using NIST framework, using Wireshark for Network Packet Analyzing, Linux CLI for (file management, and permissions), Incident handle Journal, and how to use playbooks in security incidents). • Secure Messaging App team project creating User Interface (Java, MVC, Android Studio). -
🌱 Currently learning ...
• Currently I am learning more in-depth understanding of Cybersecurity frameworks, static and dynamic malware analysis, Network security, log analysis and mangement in SIEM, vulnerability management, and web application security. -
📫 How to reach me: ...
• Email: samadali230@gmail.com • LinkedIn: https://www.linkedin.com/in/samad-ali

