Hi! I’m Danial Ali Naqvi, a Delhi based aspiring SOC Analyst with a passion for cybersecurity. My journey into this field was driven by the same fascination of technology and how it works that I’ve had since I was a child.
What excites me about Cybersecurity is the dynamic challenge of staying ahead of threats and responding swiftly to incidents. I’m eager to apply my skills, collaborate with a dedicated team, and keep learning in this ever-evolving field.
Looking forward to hearing from you!
Astute at identifying, assessing, analyzing, mitigating and documenting Assets, Risks, Threats, and Vulnerabilities
Good understanding of network infrastructure, architecture, models, protocols, communication and troubleshooting
Skilled in navigating PC Operating systems: Windows® and Linux® to perform cybersecurity related tasks
Experienced with Network Analysis tools: Wireshark, tcpdump and Security Information and Event Management (SIEM) tools: Splunk® and Chronicle®
Experienced with Threat hunting with frameworks like MITRE ATT&CK®, NIST, OSINT and Malware analysis using Anyrun and Virustotal
Skilled at investigating & responding to security incidents, and configuring Intrusion Detection and Prevention System (IDS/IPS) signatures with Suricata and Snort
Identifying whether there are any possible security issues with the given mail server by exploring any failed SSH logins for the root account using Splunk®
Reviewing and escalating a phishing SIEM alert and determining whether any other company assets have been compromised, using Google SIEM Chronicle®
Documenting file system navigation, content management, authorization and access management, user management and hashing using Linux®
Performing and documenting queries, filtering them, numeric and time based filters on queries, logical filters and joins on a database using SQL®
Investigating a file hash with Virustotal®, gathering evidence from it, escalating the incident and recording the process in a Phishing Incident Response Report
Configuring Intrusion Detection (IDS) signatures. monitoring network traffic, custom rules, using it to trigger alerts and examining the output using Suricata®
Capturing network traffic from a Linux® machine network interface, saving the captured log data to a pcap file, filtering and analyzing it using tcpdump®
Setting up a Home SOC Lab and analysing bruteforce SSH and RDP attacks using Sysmon, Fleet, ELK Stack, Mythic Agent and osTicket.
Performing an iterative purple teaming exercise with a penetration tester to prevent incoming attacks at every successive level of the Pyramid of Pain
Using Snort to sniff, analyze suspicious network traffic and writing rules Intrusion Detection and Prevention rules (IDS/IPS) to prevent Brute-force and Reverse Shell attacks
Performing Risk Analysis on a USB drive found in a parking lot and a Vulnerability Assessment and Threat Modeling report on a website using the PASTA framework
Investigating a file hash with Virustotal®, gathering evidence from it, escalating the incident and recording the process in a Phishing Incident Response Report
July 2024
Gained extensive knowledge about networks, covering concepts such as network infrastructure, models, IP addressing, protocols like TCP, UDP, IP, DHCP, ARP, routing and troubleshooting
July 2024 – August 2024
Gained foundational knowledge in cybersecurity, covering topics like threat analysis, risk management, network traffic analysis and security, SIEM tools, Linux, SQL and Python
Expected October 2024
Currently learning to monitor and investigate alerts, configure and manage security tools, develop and implement IDS signatures and escalate security incidents
Let’s Connect and Secure the Future Together!
www.linkedin.com/in/danial-ali-naqvi
danial.official03@gmail.com
+91 9667244457