Skip to content
View TrexterX17's full-sized avatar
πŸ’­
Hello World
πŸ’­
Hello World

Block or report TrexterX17

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
TrexterX17/README.md

Hi, I'm Faraz Ahmed πŸ‘‹

LinkedIn Medium

πŸŽ“ Cybersecurity & Network Security Graduate Student @ University at Buffalo
πŸ” Aspiring SOC Analyst | Blue Team | Network Security Enthusiast

I focus on defensive security, incident response, SIEM investigations, and digital forensics, with hands-on experience across enterprise-style lab environments.


🎯 Objective

Driven cybersecurity professional aiming to contribute to Blue Team operations and SOC environments by detecting threats, responding to incidents, and strengthening organizational security posture using data-driven and forensic techniques.


🧠 Core Skills

Skill Area Hands-On Project
Network Security & Segmentation pfSense Secure Network Architecture
SIEM & Log Analysis Splunk SOC Investigation & Dashboards
Incident Response Tim-Force Tabletop IR Exercise
Digital Forensics SSH Brute Force + Privilege Escalation Case
Linux Server Hardening Ubuntu & Rocky Linux Security
Malware Defense ClamAV Deployment & Validation

πŸ§ͺ Hands-On Lab Experience

Lab Description Link
πŸ›‘οΈ System Security Hands-on labs covering OS-level security, access controls and system hardening techniques View Labs
πŸ”’ Computer Security Practical exercises in vulnerability analysis, exploitation defense and secure configurations View Labs
πŸ“‹ Information Security & Assurance Labs focused on security policies, risk assessment, compliance frameworks and assurance methodologies View Labs
πŸ” Digital Forensics Forensic investigation labs including evidence acquisition, log analysis and incident reconstruction View Labs

πŸ› οΈ Tools & Technologies

🌐 Network Security

Wireshark Suricata Nmap Scapy


🐍 Python & Data Analysis

Python Scikit Learn Pandas NumPy


πŸ” Security Analytics & Detection

UEBA MITRE ATT&CK Anomaly Detection


πŸ’» Endpoint & Infrastructure

Microsoft Defender Firewall Virtualization Docker


πŸ“Š SIEM & Cloud

Splunk Microsoft Sentinel AWS Azure


πŸ“Œ Featured Projects

πŸ”Ή Incident Response – Tim-Force Tabletop Exercise
Simulated real-world incident response with timeline analysis, decision-making, and lessons learned.

πŸ”Ή Splunk SOC Investigation & Dashboards
Built SPL queries and dashboards to detect suspicious authentication and user behavior.

πŸ”Ή Digital Forensics: SSH Brute Force + Privilege Escalation
Performed forensic analysis using system logs, bash history, and timeline reconstruction.

πŸ”Ή Secure MediaWiki Hosting
Designed a segmented network using pfSense, Fail2Ban, and Linux hardening techniques.


πŸ“« Contact

Popular repositories Loading

  1. web-vulnerability-mitigation-Faraz-Ahmed web-vulnerability-mitigation-Faraz-Ahmed Public

    My project for Software Security on Web application vulnerabilities and security .

    PHP

  2. MobXcess-Secure-Server-Access-Faraz-Ahmed MobXcess-Secure-Server-Access-Faraz-Ahmed Public

    MobXcess- a secure mobile-friendly alternative to SSH that utilizes a REST- based communication protocol. The system exploit RSA 4096-bit encryption and QR-based key exchange to protect data confid…

    Python

  3. TrexterX17 TrexterX17 Public

    MY PROFILE

  4. Malware-Analysis-Platform Malware-Analysis-Platform Public

    Python

  5. SIEM_Splunk-Threat-Investigation SIEM_Splunk-Threat-Investigation Public

    Splunk SIEM forensic investigation of multi-stage cyberattack including phishing, MFA bypass, and privilege escalation.

    1

  6. Digital-Forensics-with-Incident-Response-Simulation Digital-Forensics-with-Incident-Response-Simulation Public

    Forked from PramathYaji/Digital-Forensics-with-Incident-Response-Simulation

    This investigation involved analyzing a multi-stage cyberattack where an employee was involved complex insider threat such as phishing-based coercion, web application vulnerabilities, privilege esc…

    Python