-
Iβm currently working in the Information security industry "Akij Group" The role is Officer (Cybersecurity). 1. Implement Security Onion Do Open Linux Distribution For Threat Hunting, Enterprise Security Monitoring, And Log Management 2. The Implementation of Server Virtualization Based Endorsement of a user-level Service and Banthwith management application in an Active Directory.
-
π± Iβm currently learning SOC(L1,L2) Splunk Enterprise Security, IBM QRadar and, LogRhythm
-
π― Iβm looking to collaborate on Implement Detected Lab a Corporate Industry
-
π€ Iβm looking for help with Blue Teaming detected lab as a company using open-source Technology
-
π¨βπ» All of my projects are available at https://cspboniyeamin.blogspot.com/
-
π I regularly write articles on https://boniyeamincse.blogspot.com/
-
π¬ Ask me about SOC tools Wazuh, Security Onion, Splunk, IBM radar, and cyber security Domains
-
π« How to reach me boniyeamin.cse@gmail.com
-
π Know about my experiences https://drive.google.com/file/d/17EvuvJRBEOgZcSlXoMiGJdzIRb7tQBKj/view?usp=share_link
-
β‘ As a person, I consider myself a positive person, a cross-functional team member, detail-oriented, and a Quick learner in my professional life. I feel very comfortable adapting to new environments. Iβm looking for a new challenge and taking my career to the next level, That's pretty much about me.
Akij Group Β· Full-time
March 2023 - Present
Dhaka, Bangladesh Β· On-site
As an Information Technology Officer (Cyber Security) at Akij Group, I hold a critical role in safeguarding the organization's network and systems from potential security threats. My responsibilities encompass monitoring, analyzing, and promptly responding to security events and incidents. By identifying and mitigating risks in real-time, I ensure that the organization's security posture remains at a high level. Here are the major tasks, duties, and key responsibilities I undertake in this role:
-
π SIEM Solutions Expertise: Proficient in building, developing, updating, and upgrading SIEM clusters to enhance the organization's security capabilities. Skilled in utilizing SIEM tools for real-time threat monitoring and incident response.
-
π Fortianlyzer SOC Analyst: As a Fortianlyzer SOC Analyst, I play a crucial role in detecting and responding to security incidents. Leveraging cutting-edge tools such as Wazuh, Security Onion, and Guacamole, I proactively identify potential threats. My responsibilities include real-time monitoring, incident analysis, threat intelligence, and collaborating with cross-functional teams to bolster overall security.
-
π Red Team Specialist: In my role as a Red Team Specialist, I focus on simulating real-world attacks to uncover vulnerabilities and weaknesses in systems and networks. I conduct VAPT, Web Pentests, and Network Pentest. By using advanced tools and techniques, I identify security gaps and provide actionable recommendations for remediation.
-
π Reporting and Analysis: My role demands a high level of technical proficiency, continuous learning, and the ability to adapt to emerging cybersecurity challenges. By staying at the forefront of cybersecurity practices, I am dedicated to ensuring the confidentiality, integrity, and availability of the organization's critical assets, thereby contributing to a secure and resilient digital environment.
Cybersecurity Audit & Resilient Enterprise - CARE Β· Full-time
Jan 2022 - Feb 2023 Β· 1 Yr 2 months Β· On-site
Dhaka, Bangladesh Β· On-site
As a Cybersecurity Analyst, my role encompassed a wide range of responsibilities focused on safeguarding computer networks and systems from threats and security breaches. I played a crucial role in maintaining a strong security posture and ensuring the protection of sensitive information. Here are the key details of my role:
- π Monitor computer networks and systems for threats and security breaches
- π Install, alter, and update security software and firewalls
- π Test systems for potential vulnerabilities & Conducting security assessments through vulnerability testing and risk analysis
- π Performing both internal and external security audits
- π Analyzing security breaches to identify the root cause
- π Continuously updating the companyβs incident response and disaster recovery plans
- π Verifying the security of third-party vendors and collaborating with them to meet security requirements
- π Research: Research upcoming trends in information technology and security, stay updated on potential threats and attacks, and come up with preventive strategies.
- π Prepare reports on security incidents and changing responses
- π Managing Team
- π Writing a cybersecurity article
- π Reporting & Documenting
As a Cybersecurity Analyst, I played a critical role in protecting the organization's assets, mitigating risks, and maintaining a robust security posture. Through proactive monitoring, testing, analysis, and collaboration, I contributed to the overall security resilience of the organization's systems and networks.
University of Global Village Β· Contract
Apr 2022 - Dec 2022 Β· 9 months
Barisal District, BarisΔl, Bangladesh
As a Part-time Lecturer at the University of Global Village, my role focused on delivering comprehensive and engaging courses on Ethical Hacking and Cybersecurity. I was responsible for providing students with the knowledge and skills necessary to understand and navigate the dynamic field of cybersecurity. Here are the details of my role and responsibilities:
- π Lectures and Presentations: I
- π Classroom Instruction:
- π Practical Labs and Exercises:
- π Assessments and Grading:
- π Collaboration and Professional Development:
As a Part-time Lecturer, my goal was to equip students with the necessary knowledge, skills, and ethical mindset to thrive in the field of cybersecurity. I fostered a passion for continuous learning and encouraged students to make positive contributions to the ever-changing landscape of information security.
EaglesIdea Ltd Β· Jun 2021 - May 2022
As a Junior SOC Analyst at EaglesIdea Ltd (Jun 2021 - May 2022), your role was crucial in monitoring, analyzing, and responding to security events and incidents within the organization's network and systems. You were responsible for maintaining a robust security posture and ensuring the protection of critical assets from potential cyber threats. Here are the typical responsibilities and key contributions expected from a SOC Analyst:
- π Building an open-source SOC (Wazuh)
- π Analysis and Response to Unknown Vulnerabilities
- π Investigating, Documenting, and Reporting
- π Reviewing, Prioritizing, and Investigating SIEM Alerts
In summary, as a Junior SOC Analyst, you played a pivotal role in maintaining the organization's security posture. Your expertise in threat analysis, incident response, vulnerability management, and documentation ensured that potential risks were promptly identified and mitigated, safeguarding critical assets and maintaining a secure environment.
- Degree: BSc in Computer Science and Engineering
- Duration: 2017 - 2022
- π Fundamentals of Red Hat Enterprise Linux (Red Hat)
- π Docker Training Course for the Absolute Beginner (KodeKloud)
- π Incident Response: Detection and Analysis (Pluralsight)
- π Splunk the Complete Course from Zero to Hero 2022 (Udemy)
- π Server Administration including Windows Server Management (BASIS)
- π Practical Ethical Hacking (TCM Security)
- π Creating a World Class Security Operations Center (SOC) (Cybery Limited)
- π Splunk 7.x Fundamentals Part 1 (Splunk)
- π Elastic Stack (Great Learning)
- π©π»βπ» Building a Cybersecurity SOC Lab Environment at Akij Group
- π©π»βπ» Implementing Apache Guacamole Server in Industrial Environment at Akij Group
- π©π»βπ» Building A Secure Networking System for Company (CARE)
- π©π»βπ» Implementation of Server Virtualization Endorsement of a user-level service and Bandwidth Management Application in an Active Directory (CARE)
- π©π»βπ» SIEM, IDS, DLP Development for Industrial Control Networks
- π©π»βπ» Implement Security Onion - Open Linux Distribution for Threat Hunting, Enterprise Security Monitoring, And Log Management
- π©π»βπ» Implementation of Open Source SOC using ELK stack, TheHive
- π©π»βπ» Build Your Own Security Operations Center (SOC) using The HiveCortex, MISP
- π©π»βπ» Implement Wazuh SOC for Industrial Environment
-
DevOps
-
Fortinet
-
IBM QRadar
-
CyberSecurity Assessment
-
SOC Analyst
-
Critical Thinking
-
Information Security
-
Splunk Enterprise
-
Security Operations Center
-
Malware Analysis
-
Security Onion
-
Security Information and Event Management (SIEM)
-
Wazuh
- English (Full professional proficiency)
- Bangla ( Native or bilingual proficiency )