Skip to content

TrexterX17/TrexterX17

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

33 Commits
Β 
Β 

Repository files navigation

Hi, I'm Faraz Ahmed πŸ‘‹

LinkedIn Medium Email

πŸŽ“ Cybersecurity & Network Security Graduate Student @ University at Buffalo
πŸ” Aspiring SOC Analyst | Blue Team | Network Security Enthusiast

I focus on defensive security, incident response, SIEM investigations, and digital forensics, with hands-on experience across enterprise-style lab environments.


🎯 Objective

Driven cybersecurity professional aiming to contribute to Blue Team operations and SOC environments by detecting threats, responding to incidents, and strengthening organizational security posture using data-driven and forensic techniques.


🧠 Core Skills & Hands-On Projects

Skill Area Hands-On Project
🌐 Network Security & Segmentation ICS-OT GCP Security Simulation
πŸ“Š SIEM & Log Analysis SIEM Splunk Threat Investigation
🚨 Incident Response InfoSec Tabletop Incident Response
πŸ” Digital Forensics Digital Forensics with Incident Response Simulation
πŸ›‘οΈ Website Security Hardening Web Vulnerability Mitigation
🦠 Malware Defense Malware Analysis Platform
πŸ” Mobile Encyption Security Mobile Cryptographic Encryption Security

🌐 Network Security & Segmentation

  • Simulated ICS/OT environments on Google Cloud Platform
  • Implemented network segmentation and security controls

πŸ“Š SIEM & Log Analysis

  • Threat detection and investigation using Splunk
  • Log correlation and security event analysis

🚨 Incident Response

  • Tabletop exercises for security incident scenarios
  • Developed response procedures and playbooks

πŸ” Digital Forensics

  • Evidence collection and analysis techniques
  • Incident response integration and simulation

πŸ›‘οΈ Website Security Hardening

  • Vulnerability assessment and remediation
  • Security best practices implementation

🦠 Malware Defense

  • Malware analysis and reverse engineering
  • Threat intelligence platform development

πŸ” Mobile Encryption Security

  • Mobile SSH alternative with REST API, RSA 4096-bit encryption, and QR-based key exchange
  • Lightweight security solution for portable, authenticated mobile server access

πŸ§ͺ Hands-On Lab Experience

Lab Description Link
πŸ›‘οΈ System Security Hands-on labs covering OS-level security, access controls and system hardening techniques View Labs
πŸ”’ Computer Security Practical exercises in vulnerability analysis, exploitation defense and secure configurations View Labs
πŸ“‹ Information Security & Assurance Labs focused on security policies, risk assessment, compliance frameworks and assurance methodologies View Labs
πŸ” Digital Forensics Forensic investigation labs including evidence acquisition, log analysis and incident reconstruction View Labs

πŸ› οΈ Tools & Technologies

🌐 Network Security

Wireshark Suricata Nmap Scapy


🐍 Python & Data Analysis

Python Scikit Learn Pandas NumPy


πŸ” Security Analytics & Detection

UEBA MITRE ATT&CK Anomaly Detection


πŸ’» Endpoint & Infrastructure

Microsoft Defender Firewall Virtualization Docker


πŸ“Š SIEM & Cloud

Splunk Microsoft Sentinel AWS Azure GCP


πŸ“Œ Featured Projects

πŸ”Ή Incident Response – Tim-Force Tabletop Exercise
Simulated real-world incident response with timeline analysis, decision-making, and lessons learned.

πŸ”Ή Splunk SOC Investigation & Dashboards
Built SPL queries and dashboards to detect suspicious authentication and user behavior.

πŸ”Ή Digital Forensics: SSH Brute Force + Privilege Escalation
Performed forensic analysis using system logs, bash history, and timeline reconstruction.

πŸ”Ή Secure MediaWiki Hosting
Designed a segmented network using pfSense, Fail2Ban, and Linux hardening techniques.


πŸ“« Contact

About

MY PROFILE

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors