I detect threats before they become breaches and find vulnerabilities before attackers do. Defending systems by thinking like an adversary.
I'm Mohammed Aslam, a cybersecurity professional with a dual focus on SOC operations and penetration testing. I thrive at the intersection of offense and defense — understanding both sides makes me a stronger analyst and a more effective tester.
In my SOC role, I monitor security events, triage alerts, investigate incidents, and respond to threats in real time. On the offensive side, I conduct penetration tests to identify vulnerabilities in networks, web applications, and systems before malicious actors can exploit them.
I believe the best defenders think like attackers. My goal is to continuously sharpen both skill sets to stay ahead of an ever-evolving threat landscape.
Built and tested custom detection rules in Splunk and Microsoft Sentinel to identify brute force, lateral movement, and privilege escalation patterns. Reduced false positive rate by tuning alerts against real log data.
Simulated an internal network penetration test on a lab environment. Conducted enumeration, exploitation, and post-exploitation phases. Produced a full vulnerability report with remediation recommendations.
Developed an incident response playbook for phishing attacks — from alert triage to containment, eradication, and lessons learned. Includes automated response scripts and escalation paths.
Performed a thorough web application assessment targeting OWASP Top 10 vulnerabilities including SQL injection, XSS, IDOR, and broken authentication. Documented findings in a professional pentest report.
Python tool that aggregates threat intelligence from open-source feeds, extracts IOCs (IPs, domains, hashes), and pushes them into a SIEM for automated blocking and alerting.
Created detection use cases for common AD attacks — Kerberoasting, Pass-the-Hash, and DCSync — using Windows Event Logs and SIEM correlation rules. Mapped to MITRE ATT&CK TTPs.
Whether you're looking for a SOC analyst, need a penetration test, or just want to talk security — I'd love to hear from you. Always open to new opportunities and collaborations.
See My Projects ↑