Summary
Overview
Work History
Education
Skills
Projects
Certification
Timeline
Generic
Nazia Begum

Nazia Begum

Hyderabad

Summary

Dynamic cybersecurity professional with hands-on experience in real-time threat detection, vulnerability assessment, and incident response. Proficient in using SIEM tools like Splunk and Wazuh to monitor, analyze and secure enterpris environments. Passionate about applying AI-driven threat intelligence, automation and data analytics to enhance detection accuracy and accelerate response actions. Demonstrates strong analytical and problem-solving abilities, with a commitment to continuous learning, proactive defense, and maintaining a robust security posture.

Overview

2
2
years of professional experience
3
3

Certifications

Work History

SOC Analyst

The Red Users
11.2024 - Current
  • - Monitored logs using Splunk and Wazuh SIEM for real-time threat detection.
  • - Investigated alerts related to brute-force attacks and phishing attempts.
  • - Assisted in incident triage, documentation, and remediation activities.

Cybersecurity Intern

HTech solutions
04.2024 - 09.2024
  • - Performed vulnerability assessments using Tenable Nessus and Nmap.
  • - Conducted threat intelligence research and developed IOC reports.
  • - Supported SOC team with alert prioritization and incident reporting.

Education

MBA - Information Technology And Systems

JNTU
Anantapur,India
01-2023

Skills

  • SIEM and monitoring tools: Splunk, Wazuh, ELK stack
  • Vulnerability management: Tenable Nessus, Nmap, OpenVAS
  • Network security protocols: TCP/IP, firewalls, IDS/IPS, network traffic analysis, Wireshark
  • Malware analysis basics
  • Operating Systems: Windows, Linux
  • Incident response: Threat intelligence
  • Scripting languages: Python, Bash, PowerShell
  • Data analysis and log review
  • Soft Skills: Strong analytical thinking, problem-solving and communication

Projects

  • #Project 1: Performed SSH log analysis using Splunk to monitor and identify suspicious login activities
  • Configured Splunk to collect and visualize Linux SSH logs for tracking failed login attempts and unauthorized access
  • Created SPL queries and dashboards to analyze login trends and user activity
  • Set up basic alerts to detect abnormal login patterns and potential brute-force attacks
  • Enhanced understanding of log analysis, security monitoring and threat detection within a SOC environment
  • Tools and technologies: Splunk, Linux, SSH, and SPL (Search Processing Language)
  • #Project 2: Configured and ran vulnerability scans on target systems using Tenable Nessus
  • Identified security misconfigurations and outdated software vulnerabilities
  • Analyzed scan reports to prioritize critical vulnerabilities based on CVSS scores
  • Documented results and suggested remediation steps for patching and mitigation
  • Strengthened skills in vulnerability management and risk assessment processes
  • Tools and technologies: Tenable Nessus, Windows/Linux OS
  • #Project 3: Log analysis and threat detection using Wazuh SIEM, deployed Wazuh SIEM to collect and analyze endpoint logs
  • Configured file integrity monitoring (FIM) and alert rules for threat detection, integrated Wazuh with the ELK Stack for visualization and event correlation

Certification

  • EC-Council Certified Ethical Hacker (CEH v13)with AI
  • Google Cybersecurity Certificate – Foundations of Cybersecurity (Coursera)
  • Qualys Vulnerability Management

Timeline

SOC Analyst

The Red Users
11.2024 - Current

Cybersecurity Intern

HTech solutions
04.2024 - 09.2024

MBA - Information Technology And Systems

JNTU
Nazia Begum