Cybersecurity Professional

Securing the digital frontier

Cybersecurity specialist passionate about network security and cloud security. Currently pursuing a Bachelor of Computer Science with a focus on cybersecurity.

Cybersecurity Professional

Cybersecurity Student

BS Computer Science (2021-2025)

About Me

My Journey in Cybersecurity

Dedicated cybersecurity enthusiast with a passion for protecting digital assets and infrastructure. Constantly learning and adapting to the evolving threat landscape through formal education and hands-on training.

Education
  • Bachelor of Computer Science, Abdul Wali Khan University Mardan (2021-2025)
  • Cybersecurity courses from Udemy, Coursera, TryHackMe, and HackTheBox
  • Specialized in network security and cloud security
Certifications
  • CompTIA Security+ (Certification ID: COMP00102230710)
  • CompTIA A+ (Certification ID: KH7HZXPYN1E41592)
  • Google Cybersecurity Specialization (Credential ID: 8EVAJ4K572GJ)
  • Linux Fundamentals, Hack The Box (July 2024)
My Skills

Technical Expertise

A comprehensive set of cybersecurity skills developed through education, certifications, and hands-on training platforms.

Network Security

  • Firewall Configuration
  • VPN Setup
  • Network Monitoring

Cloud Security

  • AWS Security
  • Azure Fundamentals
  • Cloud Architecture

Security Tools

  • Wireshark
  • Nmap
  • Metasploit

Operating Systems

  • Linux
  • Windows
  • Security Hardening

Web Security

  • OWASP Top 10
  • Web Vulnerabilities
  • Secure Development

Programming

  • Python
  • Bash Scripting
  • JavaScript
Certifications

Professional Credentials

Industry-recognized certifications that validate my expertise and knowledge in cybersecurity.

CompTIA Security+

ID: COMP00102230710Issued: January 2023

Validates baseline skills necessary to perform core security functions and pursue an IT security career.

Network Security
Compliance
Identity Management

Linux Fundamentals.

ID: HTB-LF-2024Issued: July 2024

Comprehensive training in Linux system administration with a focus on cybersecurity applications.

Linux System Administration
Cybersecurity
Command Line

CompTIA A+

ID: KH7HZXPYN1E41592Issued: September 2023

Foundation-level certification that covers essential IT operational skills and troubleshooting.

Hardware
Software Troubleshooting
Networking

Google Cybersecurity Specialization

ID: 8EVAJ4K572GJIssued: January 2025

Comprehensive program covering key cybersecurity concepts, tools, and techniques from Google.

Security Operations
Network Security
Incident Response
Continuous Learning

Cybersecurity Training

Hands-on experience gained through various cybersecurity training platforms and online courses.

TryHackMe

Completed numerous rooms and challenges focused on practical cybersecurity skills

Key Achievements:

  • Top 10% of users
  • 50+ rooms completed
  • Specialization in network security

HackTheBox

Engaged with realistic penetration testing scenarios and security challenges

Key Achievements:

  • Multiple machines compromised
  • Completed various challenges
  • Linux Fundamentals certification

Udemy

Completed structured courses on various cybersecurity topics

Key Achievements:

  • Ethical Hacking courses
  • Network Security fundamentals
  • Python for cybersecurity

Coursera

Finished professional courses and specializations in cybersecurity

Key Achievements:

  • Google Cybersecurity Specialization
  • Network Security courses
  • Cloud Security fundamentals
Professional Experience

Internships & Work Experience

Practical experience gained through internships and professional engagements in the cybersecurity field.

Mastercard Cybersecurity Virtual Experience Program

Forage

January 2025

Virtual

Completed a job simulation where I served as an analyst on Mastercard's Security Awareness Team.

Key Responsibilities:

  • Helped identify and report security threats such as phishing
  • Analyzed and identified which areas of the business needed more robust security training
  • Implemented training courses and procedures for teams with security vulnerabilities

ANZ Australia Cyber Security Management Job Simulation

Forage

January 2025

Virtual

Completed a simulation focussed on identifying cybersecurity threats at ANZ.

Key Responsibilities:

  • Investigated e-mails to report suspicious items
  • Analysed a Packet Capture file using an open source tool
  • Identified and investigated potential security threats

Data Operator Intern

Pakistan Customs (Federal Board of Revenue)

Jun 2023 - Sep 2023

Peshawar District, Khyber Pakhtunkhwa, Pakistan

Worked as a data operator, handling data collection and analysis to enhance the department's functionality.

Key Responsibilities:

  • Managed data entry and organization for customs records
  • Assisted in data analysis for departmental reports
  • Supported administrative functions related to data management
Projects

Security Research & Projects

A showcase of my hands-on experience and practical applications of cybersecurity concepts.

Project thumbnail for Darkweb Trend Analyzer
Darkweb Trend Analyzer

Developed a comprehensive platform for analyzing and visualizing darkweb trends, including cryptocurrency transactions, marketplace activities, and threat intelligence.

Python
Data Analysis
Web Development
Cybersecurity
OSINT

I'm constantly working on new cybersecurity projects and research. Check back soon for more updates!

Featured Project

Darkweb Trend Analyzer

A comprehensive platform for analyzing and visualizing darkweb trends, including cryptocurrency transactions, marketplace activities, and threat intelligence.

Darkweb Trend Analyzer Dashboard

Project Overview

The Darkweb Trend Analyzer is a final year project designed to provide insights into darkweb activities, helping security professionals track and analyze trends in this hidden part of the internet.

Python
Data Analysis
Web Development
Cybersecurity
OSINT

Key Features

Trend Analysis

Visualize and track trends in darkweb activities over time with interactive charts and graphs.

Data Collection

Gather and process data from various darkweb sources while maintaining ethical boundaries.

Intelligence Gathering

Extract valuable intelligence from darkweb forums, marketplaces, and other sources.

Threat Detection

Identify potential security threats and vulnerabilities being discussed or sold on the darkweb.

Blog

Latest Articles

Insights, tutorials, and thoughts on cybersecurity, ethical hacking, and digital defense strategies.

Loading blog posts...

Get In Touch

Contact Me

Interested in working together or have a question? Feel free to reach out.