π‘οΈ Ishan Shah | Threat Researcher | Certified Web Pentester | GRC Scholar | Upcoming Google Cybersecurity Certified Professional π
πΉ Currently:
- Focus: Web privacy and compliance
- First author of related research work
πΉ Collaboration Interests:
- Threat understanding and vulnerability exploration
- System security improvements
- Working with security-passionate teams
πΉ Open to:
-
Being part of Organizations, Research labs, or Companies in Cybersecurity.
-
Gaining experience and contributing to the field.
πΉ Currently Learning:
- Threat analysis
- Advanced Penetration testing
- Advanced cybersecurity research methods
πΉ Ask Me About:
- Certified Pentester experience
- Researcher journey
- Building a cybersecurity career
πΉ Fun Fact:
- Spent nights analyzing threat patterns
- "Sleep can wait, vulnerabilities can't" π΅οΈββοΈπ»
π₯οΈ Testing Skills: Penetration Testing, API Testing (Postman), Automated Testing (Selenium, JMeter)
πΎ Security and Network Analysis: Metasploit, Nmap, Wireshark, Nessus, Snort, Splunk
π Web & API Security: Burp Suite, Nikto, SQLMap, Dirbuster
π΅οΈ OSINT & Reconnaissance: Maltego, Shodan, Google Dorking, SpiderFoot, theHarvester, OSINT Framework
π‘οΈ Defensive Security (Blue Team)
π₯οΈ SIEM & Monitoring: Splunk
π¨ Incident Response: Wireshark
π Operating Systems & Networks
π§ Linux: Linux (Kali, Ubuntu), Windows (Server, Active Directory)
π₯οΈ Windows Security: PowerShell
π Network Security: Nmap, Netcat
π Artificial Intelligence & Machine Learning
π€ Machine Learning (ML): Supervised and Unsupervised Learning,Transfer Learning & Fine-tuning LLM's.
πΈ Computer Vision: Object Detection, Image Classification,YOLO ,Segmentation
π Certifications: TryHackMe Junior Web Pentester, Google Cybersecurity Certified Professional(ongoing)

