Skills
Technical Expertise
Penetration Testing
- Web Application Testing
- Network Infrastructure Testing
- Active Directory Testing
Vulnerability Assessment
- Vulnerability Scanning
- Nessus
- Risk Assessment
Exploit Development
- Reverse Engineering
- Malware Analysis
CTF Competitions
- Web Exploitation
- Large Language Model
- Infrastructure
- Open Source Intelligence
Security Operations
- SIEM Implementation & Management
- Security Monitoring
- Threat Detection
- Alert Triage
- Incident Response
Network Security
- Firewall Configuration
- IDS/IPS Management
- VPN Implementation
- Network Segmentation
- Traffic Analysis
Endpoint Security
- EDR Solutions
- Host-based Firewalls
- Endpoint Hardening
Threat Hunting
- IOC Development
- Behavioral Analysis
- Forensic Investigation
Regulatory Compliance
- GDPR
- HIPAA
- PCI DSS
- SOX
- PDPA
- IMDA Cop TCS
Security Frameworks
- NIST Cybersecurity Framework
- ISO 27001/27002
- COBIT
- MITRE ATT&CK
- STRIDE
Risk Management
- Risk Assessment
- Threat Modeling
- Business Impact Analysis
Policy Development
- Security Policies
- Standards & Procedures
- Guidelines
- Security Awareness
Programming Languages
- Python
- C
- Rust
- Bash/Shell Scripting
- JavaScript
Cryptography
- Encryption Algorithms
- PKI
- Hashing
- Digital Signatures
- TLS/SSL
Tools & Technologies
Penetration Testing
Metasploit
Burp Suite
Nmap
Wireshark
OWASP ZAP
Kali Linux
Aircrack-ng
Hashcat
sqlmap
Netexec
Security Operations
Splunk
ELK Stack
Snort
Suricata
Cloud
AWS
Docker
Kubernetes
Soft Skills
Organization
Teamwork
Project Management
Problem Solving
Report Writing
Adaptability