I am a Cybersecurity Specialist with strong expertise in Application Security and Security Operations (SOC). Since 2020, I have been actively involved in software development and penetration testing, building secure applications, analyzing threats, and responding to incidents.
As an Application Security Engineer, I focus on identifying vulnerabilities in source code, securing web applications, and integrating security into CI/CD pipelines. My experience includes secure code reviews, threat modeling, SAST/DAST tools, and container security.
As a SOC Analyst, I specialize in incident response, threat hunting, memory and malware analysis, and SIEM log correlation. I have hands-on experience with tools like Volatility, Wireshark, ELK, Wazuh, and Splunk, Malware analysis and I actively use the MITRE ATT&CK framework to map adversary techniques.
With a dual background in software engineering and security operations, I bring a holistic approach to protecting systems β from writing secure code to defending against advanced cyber threats.
Security Researcher xinux.uz
πΉ Application Security Engineer
Secure Code Review β Identifying vulnerabilities in PHP, Pytho and JavaScript/NodeJs
Web Application Penetration Testing β XSS, SQLi, CSRF, IDOR, SSRF, RCE, File Upload attacks and other attacks
Threat Modeling & Secure Design β Based on OWASP ASVS, OWASP Top 10, CWE/SANS Top 25
SAST & DAST β Hands-on with SonarQube, Semgrep, Burp Suite, OWASP ZAP, Nikto and other tools
Dependency & Supply Chain Security β Securing Composer, NPM, and Pip packages
πΉ SOC Analyst
SIEM & Log Analysis β Skilled in Splunk, ELK, Wazuh, Graylog for log correlation and threat hunting
Incident Response (IR) β Experienced in Triage, Containment, Eradication, and Recovery processes
Malware Analysis β Static and dynamic analysis (strings, YARA, Volatility, Wireshark)
Memory Forensics β Detecting credential dumping and process injection with Volatility3, Rekall
Network Traffic Analysis β PCAP investigation, writing Suricata/Zeek IDS rules
Endpoint Security β Creating Sysmon rules and analyzing EDR logs
Threat Intelligence β Working with IOCs, YARA rules, Sigma rules, and MISP integrations
MITRE ATT&CK Mapping β Tracking adversary TTPs and correlating attack scenarios