Skip to content
View ibtesam5d's full-sized avatar
Block or Report

Block or report ibtesam5d

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ibtesam5d/README.md

Hello, I am Ibtesam

I am an aspiring Cybersecurity professional with a profound interest in technology and a dedication to solving complex problems.

Objective

I pivoted my career from Civil Engineering to Cybersecurity. My fascination with the rapidly evolving landscape of cybersecurity and the increasing prevalence of cyber threats compelled me to transition my career path. Having worked in Civil Engineering, I developed strong problem-solving skill. I am now eager to transition into cybersecurity, specifically aiming to join a Security Operations Center (SOC) as a Tier 1 Analyst/Engineer.

Skills

Skill Associated Project
Identifying and Remediating Vulnerabilities Vulnarability Analysis Lab
Identity and Access Management IAM Solutions Architect Lab
Static and Dynamic Malware Testing Malware Analysis Lab
Cloud Network Security Azure Webserver Deployment Lab
Security Automation with Shuffle SOAR S.O.C. Automation Lab
Incident Response Planning and Execution S.O.C. Automation Lab
Case Management with TheHive S.O.C. Automation Lab
Scripting and Automation for Threat Mitigation S.O.C. Automation Lab
Phishing Awareness Training Phishing Email Lab

Tools

Network

Endpoint

Cloud

SIEM

Frameworks

Application Security

Certifications

Projects

Pinned Loading

  1. vulnerability vulnerability Public

    Enhanced Vulnerability Management with Tenable Nessus: A Comprehensive Scan and Remediation Strategy

  2. wazuh wazuh Public

    Enhancing Security Operations with S.O.C Automation using SIEM & SOAR

  3. IAM IAM Public

    Implemented Identity and Access Management (IAM) solutions to bolster cybersecurity within the organization.

    1

  4. mal mal Public

    Repository featuring detailed analysis and findings on "factura.doc" malware, conducted using Remnux Linux toolkit in a sandboxed environment.

  5. nextcloud nextcloud Public

    Secure Deployment of Nextcloud Web Server in Azure Cloud Environment

  6. phishing-simulation phishing-simulation Public

    Phishing simulation and awareness training project